Posts

At WWDC 2025, Apple Unveils Liquid Glass and Previews New OS Features

Apple’s Worldwide Developer Conference keynote was a lightning-fast 92-minute tour of Apple’s vision for how we’ll use its products in the next year. Apple wove two themes through the presentation: the new Liquid Glass design language will provide a consistent look and feel across all its platforms, and Apple Intelligence-powered features will continue to appear throughout the ecosystem. The other overarching news is that Apple is adopting a new annual versioning approach, similar to car model years, so the version number for each operating system will be 26.

Apple previewed numerous features during the keynote and listed even more on its website afterward. Below, we’ll focus on those we think will make the most difference to your Apple experience, but we also encourage you to read Apple’s pages for each platform to learn more about what’s coming. Those are linked here, along with basic hardware requirements, so you can determine if your devices will be eligible to upgrade this fall:

  • macOS 26 Tahoe: MacBook Air with Apple silicon (2020 and later), MacBook Pro with Apple silicon (2020 and later), MacBook Pro (16‑inch, 2019), MacBook Pro (13‑inch, 2020, four Thunderbolt 3 ports), iMac (2020 and later), Mac mini (2020 and later), Mac Studio (2022 and later), Mac Pro (2019 and later)
  • iOS 26: iPhone SE (2nd generation), iPhone 11, and later
  • iPadOS 26: iPad (8th generation and later), iPad mini (5th generation and later), iPad Air (3rd generation and later), iPad Pro 11‑inch (1st generation and later), iPad Pro 12.9‑inch (3rd generation and later), and iPad Pro (M4)
  • watchOS 26: Apple Watch SE (2nd generation), Apple Watch Series 6 and later, and Apple Watch Ultra and later
  • visionOS 26: All Vision Pro headsets
  • tvOS 26: Apple TV 4K

First, let’s look at Liquid Glass, after which we’ll examine a handful of changes we think Apple users will find most interesting.

Liquid Glass Gives Apple’s Platforms a Fresh Look

Apple’s last major interface redesign occurred in 2013 with the release of iOS 7. Since then, the company’s hardware and graphics technologies have advanced significantly, enabling the new Liquid Glass interface design. It brings to life a new glass-like “material” for interface elements that blurs the line between the physical and the virtual. Liquid Glass is both translucent and malleable, allowing background content to refract through the controls, which can morph, flex, and illuminate in response to user interaction.

Liquid Glass encompasses all of Apple’s platforms and extends to every aspect of the interface, including controls, navigation bars, tabs and sidebars, alerts, widgets, icons, the menu bar, and the Dock. Functionally, Apple has taken the opportunity to improve some interactions, so alerts appear from where you tap rather than taking over the entire display, and context menus expand into scannable lists rather than requiring awkward horizontal scrolling. When you interact with toolbars or other controls, they expand and become more prominent, but as soon as you’re done, they minimize themselves to let you focus on the content. Watch Apple’s intro video to get a feel for it.

The main concern with Liquid Glass is that it may lack contrast and be difficult to read for those whose vision isn’t perfect. In the past, Apple has provided a Reduce Transparency option in the Accessibility settings for macOS, iOS, and iPadOS to eliminate any color bleeding through translucent menus and dialogs; we’ll see if such an option proves necessary for some.

iPadOS 26 Takes Lessons from macOS

Ever since the introduction of the iPad, people have been frustrated by the extent to which it was a larger iPhone rather than a smaller, touch-sensitive Mac. Apple took small steps toward enhancing productivity by adding features like Slide Over and Split View, but they were fussy to use and never achieved widespread acceptance. With iPadOS 26, Apple has finally acknowledged that the iPad should just work more like a Mac. To that end, iPadOS 26 will offer Mac-like features in the following areas:

  • Window management: Every app can now be transformed into a standalone window that you can move and resize freely. Windows remember their size and position, and you can tile them flexibly, with options to split the screen into two, three, or four sections. The familiar traffic light window controls from the Mac reappear along with the macOS Move & Resize and Fill & Arrange options. Swiping up invokes Exposé, allowing you to view all windows and switch to your desired one easily.
  • Menu bar and Dock: iPadOS gains a menu bar that looks and works like the one on the Mac, but it only appears when you swipe down from the top of the screen. You can also put folders in the Dock and access their contents in much the same way docked folders appear as a stack on the Mac.
  • Filesystem access: The Files app resembles a Finder window much more now, thanks to the addition of collapsible folders and resizable columns. It allows you to select which apps will open specific document types and even modify the defaults. Additionally, you can customize folders with colors and icons.
  • Preview makes the move: One of the core Mac apps, Preview, is coming to the iPad. Just as on the Mac, you can use Preview for viewing and editing images and PDFs, and it offers full support for the Apple Pencil.
  • Background processing: Computationally intensive processes and other activities that take a long time, like exporting edited videos and downloading large files, can now run in the background while you engage in other tasks.

Apple Intelligence Expands Across the Ecosystem

Apple Intelligence has been far from a rousing success, with Apple’s failure to deliver last year’s promised update to Siri being the most prominent misstep. But Apple isn’t giving up and will be tapping into Apple Intelligence in many more places across all its operating systems and apps.

Even more important, the company announced that it is opening Apple Intelligence to developers, so we can expect to see features powered by Apple’s on-device large language models appearing in third-party apps this fall. That’s a big deal because Apple’s models provide fast response times, prioritize privacy, and incur no per-prompt costs.

Some of the new and expanded uses of Apple Intelligence include:

  • Visual Intelligence: You can now use Visual Intelligence to learn more about and act on information displayed on your iPhone screen. You could research a piece of clothing you see while browsing, or create a calendar event based on a social media banner. You can also ask ChatGPT about anything you see on screen.
  • Shortcuts gets Apple Intelligence: New intelligence actions in Shortcuts enable you to leverage Apple Intelligence to summarize text, create images, and more. Interestingly, shortcuts can even access Apple Intelligence’s Private Cloud Compute for more power-intensive tasks.
  • Image Playground & ChatGPT: When using Image Playground, you can create images in a wider variety of styles with ChatGPT.
  • Combine emoji for Genmoji: Previously, you could use text descriptions to create custom Genmoji; now, you can make them by combining existing emoji.
  • Messages backgrounds: Chats in Messages will offer shared backgrounds, and users can create custom backgrounds with Image Playground.
  • Messages polls: Group chats in Messages will gain polls—where should we go for dinner tonight?—and Apple Intelligence will automatically detect when a poll might be helpful and suggest one.
  • Wallet order details: With Apple Intelligence, the Wallet app can identify and summarize order details, including tracking information.
  • Workout Buddy: In the watchOS 26 Workout app, Apple Intelligence powers a virtual workout buddy that talks to you while you exercise, offering motivation, real-time stats, and post-workout feedback.

These new applications of Apple Intelligence may not rock your world, but together, they offer some appreciated enhancements. We also look forward to seeing how developers leverage Apple Intelligence models in innovative ways.

Live Translation Edges Toward the Universal Translator

Perhaps the most significant additional feature driven by Apple Intelligence in the new operating systems is Live Translation. It’s integrated into the Phone, FaceTime, and Messages apps. In the Phone app, you get spoken translations between supported languages. In FaceTime, you see the other person’s translated text as a caption, and Messages translates their text. Live Translations may prove to be a lifesaver on your next international trip.

Spotlight Gains Enhanced Capabilities

Whenever you do a search on the Mac, you’re using Spotlight. It can also search within apps like Contacts and Calendar, access various online sources, open documents, launch apps, and more. Despite that, Spotlight has paled in comparison to launchers like Alfred, LaunchBar, and Raycast. No more.

In Apple’s new operating systems, Spotlight will enable users to perform hundreds of actions across various apps. It will also be capable of understanding what you’re working on and suggesting relevant files, apps, or actions. For instance, you’ll be able to start a timer, create calendar events, generate a new email message with pre-filled fields, play a podcast episode, and more.

Spotlight also introduces the concept of “quick keys,” which are short, custom mnemonics for specific actions. For instance, you might type sm to trigger Spotlight to send a message or ar to add a reminder.

In addition, Spotlight becomes a clipboard manager, providing access to recently copied items, including text, images, and links. You can browse, search, and insert previous clipboard entries directly through Spotlight.

Phone App Introduces Call Screening and Hold Assist

Phone calls may not be the primary use of the iPhone for many people, but they remain a fact of life. With iOS 26, Apple has introduced two features that, if they work as promised, will alleviate two common pain points associated with calls.

Call Screening builds on the Live Voicemail feature by automatically answering calls from unknown numbers, without even alerting you. Once the caller provides their name and the reason for their call, the Phone app rings and presents information to help you decide whether to answer.

The other new feature is Hold Assist, which automatically detects hold music and asks if you want it to wait on hold for you, allowing you to attend to other tasks. When someone on the other end picks up, it informs them that you’ll be there shortly and notifies you that it’s time to return to the call.

Although we think of using the Phone app exclusively on the iPhone, Apple is also bringing it to macOS 26 and iPadOS 26, thanks to Continuity. Once you upgrade, you’ll be able to take advantage of these features—and Live Translation—on those platforms as well.

Dismiss Notifications with the Flick of a Wrist

Finally, watchOS 26 introduces a new gesture that we believe will be popular: the wrist flick. Whenever a notification appears on screen, you can quickly rotate your wrist away from you to dismiss it. This feature is a great little addition to the Apple Watch interaction model.

If none of these changes seem earthshaking to you, we agree. With six operating systems and billions of users, Apple can’t move as quickly as smaller companies. While Liquid Glass will dramatically change the look of our Apple devices, the other new features shouldn’t require us to learn completely new methods of interaction.

(Featured image by Apple)


Social Media: At its Worldwide Developer Conference, Apple unveiled the first major interface change to its operating systems in many years, along with a boatload of new features, many powered by Apple Intelligence. Here are a few of our favorites.

Ten Tips for Making the Best Use of AI Chatbots

Since ChatGPT launched in late 2022, people have been using AI chatbots to brainstorm, speed up research, draft content, summarize lengthy documents, analyze data, assist with writing and debugging code, and translate text into other languages. Recently, the major chatbots have gained Web search capabilities, allowing them to access live information beyond their training model data.

Using a chatbot effectively requires new approaches to thinking and working, especially when it comes to searching for information. Just as with a human assistant, you need to play to their strengths when figuring out the best ways to get the results you want. Incorporate these tips into your chatbot conversations, and you’ll see significantly better outcomes.

  1. Be specific and complete: Decades of search engine use push us toward short, focused search phrases with keywords that will appear in the results. In contrast, chatbots thrive on specificity and detail. For instance, prompting a chatbot with “iCloud photos syncing” won’t generate nearly as useful a response as “Tell me what might prevent iCloud from syncing photos between my Mac and iPhone.” Also, don’t shy away from negative prompting—tell the chatbot what not to include or consider in its response. You can even be specific about formatting the output as a bullet list, table, or graph.
  2. Every prompt is a conversation: We are accustomed to standalone searches, where, if the search fails, you must start over. You’ll achieve much better results with chatbots if you consider everything a conversation. Even responses to specific, detailed prompts may not fully address your question or could lead you to think of additional ones. Ask follow-up questions, clarify what you want to find out or accomplish, provide feedback, or redirect the conversation as needed. (For the ultimate chatbot conversational experience, try voice mode in the ChatGPT or Claude apps, where they talk back to you. It’s excellent for capturing ideas, refining your thinking, or just doing a brain dump.)
  3. Edit your last prompt: If the most recent response from a chatbot is entirely unsatisfactory, you may have better luck editing and resubmitting it rather than informing the chatbot that it has made a mistake. There’s usually an edit link or pencil button that appears when you hover over it.
  4. Context can help: Most chatbots maintain libraries of previous conversations, allowing you to search through them to find old ones easily. Because chatbot responses improve with more context, it can be helpful to return to one of those conversations when you want to explore that topic further. Similarly, if you’re asking a chatbot to create something similar to something you’ve already done, provide the previous work as an example.
  5. Ask it to role-play: Another way to increase context is to ask the chatbot to “act as” a particular type of professional, such as an editor, coach, marketer, or software developer. In essence, you’re asking the chatbot to respond in the context of a certain role. Conversely, it can be helpful to ask it to tailor its response as if you were a high school student, someone with a basic understanding of the topic, or an expert in the field.
  6. Know when to start over: Although context is key, chatbots have a limited memory, so long conversations can overwhelm what’s called the “context window.” If you notice the chatbot hallucinating, starting to repeat itself, or going off into the weeds, try saying, “Please summarize what we’ve discussed in a prompt I can use to continue working on this topic.” Then, copy that prompt into a new chat before continuing the conversation.
  7. Force Web searches as necessary: Most chatbots make it explicit when they are searching the Web, which means you can also tell when they aren’t searching and are thus relying on potentially outdated training data. If you want to ensure that you’re getting the latest information, tweak your prompt to start with something like “Search for…”
  8. Test its limits: Since every chatbot response is based on just what you say in the prompt, it won’t necessarily go as deep as you would like. Try asking it to critique its own output, generate multiple options, or present the best argument for different perspectives. You can even request it to be more cautious or more creative. It’s fine to challenge a chatbot in ways that would be socially inappropriate with another person.
  9. Save and reuse effective prompts: When you identify prompts that work particularly well for recurring tasks—such as generating meeting summaries, analyzing data, or drafting specific types of content—save them for reuse so you don’t have to start over each time.
  10. Don’t believe everything you read on the Internet. While chatbots are incredibly confident and often truly astonishing in what they can produce, it’s your responsibility to verify important facts and details (just as with human-created information, which isn’t necessarily any more trustworthy). The statistical models they use can lead to completely fabricated information. Although this is less true with Web searches, even there, they can combine information in ways that simply aren’t accurate.
  11. Try deep research: Bonus tip! Many chatbots offer a so-called deep research mode, which allows the chatbot to go off for 5 or 10 minutes to gather information, analyze it over multiple steps, and produce a much more comprehensive response. Deep research is too slow for a conversation, but it can provide a good foundation when you’re exploring a new topic that requires a lot of detail.

While AI chatbots are powerful tools, they work best when you think of them as collaborative partners rather than magical solutions. The key is experimentation—try different approaches, refine your prompting style, and don’t hesitate to push the limits of what they can do. Start with these fundamentals, but remember that becoming proficient is an ongoing process.

(Featured image by iStock.com/Memorystockphoto)


Social Media: Getting the most out of ChatGPT and Claude requires a different approach than using a traditional search engine. Learn ten essential tips for better prompting, from being conversational to leveraging context and even role-playing.

Consider Business Cyber Insurance

When discussing digital security, we typically focus on preventive measures, such as using strong passwords with a password manager, enabling multi-factor authentication, keeping systems up to date, maintaining regular backups, and training employees to recognize potential security threats. While these practices are essential, they don’t guarantee complete protection.

No one is immune to online attacks—the most security-conscious organizations and individuals can still become victims. Even security experts occasionally click something they shouldn’t have or forget to keep a little-used system up to date. A single employee opening a convincing phishing email, a momentary lapse in judgment, or a zero-day vulnerability can lead to devastating consequences.

According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime-related losses from 2020 through 2024 are estimated at $50.5 billion, with IC3 receiving 4.2 million complaints. Most concerning is the rising trend in the frequency and severity of these attacks.

Given these statistics and the reality that perfect security is impossible, many are looking to protect themselves from possible financial losses. Just as fires and accidents make home and auto insurance necessary, these ever-increasing threats from phishing, malware, and other forms of digital attack make cyber insurance an important consideration for both companies and individuals. We’ll focus on businesses here and explore personal cyber insurance in a future article.

What Is Business Cyber Insurance

Cyber insurance for businesses helps companies recover from security breaches and online attacks. Unlike traditional business insurance policies, cyber insurance focuses on the risks of using technology to operate or to store sensitive data online. Businesses of all sizes are vulnerable, but small and medium-sized businesses are often targeted because they lack the robust security infrastructure of larger enterprises.

Industries that are especially at risk include healthcare, financial services, retail, and professional services, but no sector is immune. You may have cause for additional concern if your company collects customer information, processes payments, or maintains a significant online presence, but realistically, every business that uses email or conducts online banking is vulnerable.

What’s Covered

A business cyber policy typically includes two core types of coverage:

  • First-party coverage: This coverage responds to direct costs incurred by your company, including legal expenses, data breach response and notification costs, ransomware payments and recovery expenses, business interruption losses, data restoration, system replacement, and crisis management.
  • Third-party coverage: Also known as liability insurance, this coverage protects you against claims from others affected by the breach, including legal defense costs, settlements, regulatory fines and penalties, and PCI-related fines associated with credit card processing.

What’s Not Covered

However, it’s essential to be aware of common exclusions to business cyber insurance, the most important of which are:

  • Weak security processes: Insurance doesn’t exempt you from maintaining a strong security stance—if you aren’t requiring strong passwords, providing security training, and correcting known vulnerabilities, the policy won’t cover you. Insurers will likely require verification of minimum cybersecurity practices before providing coverage.
  • Prior breaches: Just as health insurance may not cover pre-existing conditions, cyber insurance typically does not cover events that occurred before the policy was taken out.
  • Insider attacks or misconduct: Deliberate or fraudulent acts by company leadership or employees generally aren’t covered. Employees are a company’s greatest resource, but they can also be its greatest weakness.

Shopping for Business Cyber Insurance

How much will business cyber insurance cost? It varies based on your company size and revenue, industry sector, type and amount of sensitive data stored, security practices, coverage limits and deductibles, and claims history. That said, small businesses with yearly revenues under $1 million typically have annual premiums ranging from $500 to $2,000. Mid-sized firms often pay between $2,000 and $10,000, and large companies can expect premiums in the tens of thousands.

It’s common—and entirely understandable—to hesitate to purchase cyber insurance due to concerns about the cost. However, the potential financial impact of an incident is often significant. IBM’s 2024 Cost of Data Breach Report found that the average cost of a data breach was $4.9 million globally, but $9.4 million in the United States. Although IBM doesn’t break out costs by company size, those costs are likely for larger companies. Nonetheless, a Financial Times report notes that users at small and medium-sized businesses were twice as likely to encounter threats as those at large companies.

Choosing the right cyber insurance broker is as important as selecting the policy itself, and you’ll want to involve your security team in the search. Look for someone specializing in cyber coverage who has technical expertise in cybersecurity practices, strong relationships with underwriters, and a track record of providing active claims support. A good broker will not only find competitive pricing but also help tailor coverage to your specific risks and ensure you’re prepared to meet underwriting requirements.

When comparing cyber insurance options, pay attention to the details. Confirm that the policy addresses risks specific to your situation and provides sufficient financial protection for your potential exposure. Pay close attention to exclusions—there will be more than those listed above. Research the insurer’s claims process and reputation for responsiveness, as timely support during an incident is crucial. Finally, inquire about additional risk management services offered by the insurer that may provide valuable preventative resources to complement your coverage.

Start Researching Cyber Insurance Now

Unfortunately, the frequency and risk of cyber attacks are on the rise. Proactive security measures are key, but a single mistake or oversight could have dire outcomes. Cyber insurance provides an important safety net in the event of a breach or attack that evades your best efforts.

We won’t pretend that finding and purchasing cyber insurance is simple, but we can help with finding a good cyber insurance broker, evaluating the policy, answering application questions, and ensuring that your company meets the necessary security requirements.

(Featured image by iStock.com/Who_I_am)


Social Media: Cyber insurance can protect your business from crippling financial losses after a security breach. Learn what’s covered, what’s not, and how to shop for the right policy for your company.

Security Precautions to Take While Traveling

When we think about digital and device security, we mostly think about the fixed locations where people spend most of their time—home, school, and work. But what about when you’re traveling? Some security concerns remain the same when you’re on the road, but new ones crop up.

We’ll assume that you already keep your devices up to date, use FileVault on Macs, have at least a six-digit iOS passcode, have strong password habits, and use multi-factor authentication wherever possible. Other options are more specific to travel.

As with our more general article about increasing security last month, we’ve divided our list of suggestions into two parts: things that everyone should do and measures that only people who worry about being specifically targeted should employ.

Sensible Travel Security Precautions for Everyone

These suggestions are appropriate for everyone who travels, and they’re aimed primarily at avoiding relatively common problems: loss, theft, data loss, and generalized snooping:

  • Focus on physical security: As a tourist, you may be targeted by thieves, so it’s important to keep your iPhone in a secure pocket whenever you’re not using it. Carry an iPad or laptop in a bag that can’t be snatched, or leave them locked or at least concealed in your hotel room.
  • Enable Find My for all your devices: You should have already done this, but if not, enable Find My to improve your chances of finding a device you lose or accidentally leave behind. It might help if the device is stolen, but local police cooperation for recovering stolen items can vary widely. Don’t attempt to recover a stolen device yourself.
  • Put AirTags in your luggage and laptop bags: AirTags can help you track down lost luggage—you can now share their locations with airlines—and prevent you from accidentally leaving bags behind. An AirTag may also help with locating a stolen item, but always work with local law enforcement.
  • Enable biometric authentication and Stolen Device Protection: Using Face ID or Touch ID wherever possible and having Stolen Device Protection enabled on your iPhone in Settings > Face/Touch ID & Passcode is even more important when traveling.
  • Use a VPN or iCloud Private Relay: Because you may be using Wi-Fi networks whose security you know nothing about, it’s best to use a VPN like Mullvad VPN, NordVPN, or ProtonVPN to encrypt all your traffic. At a minimum, use iCloud Private Relay, which requires an iCloud+ subscription and won’t encrypt traffic from most non-Apple apps.
  • Use iCloud Photos or another backup option: To ensure you don’t lose precious vacation photos, use iCloud Photos so all your photos are uploaded to the cloud whenever you have access. This will almost certainly require an iCloud+ subscription for sufficient storage space. If Wi-Fi and cellular are too slow or unavailable, consider an external SSD to which you can manually export photos and videos for backup. To speed up the process, you could create a shortcut that automatically copies all photos taken that day.
  • Use iCloud Backup: It’s best to use iCloud Backup to back up your entire iPhone every night. That way, if your iPhone is lost or destroyed, you may be able to buy a replacement and restore from backup in relatively little time. You will probably need an iCloud+ subscription to have enough backup space.
  • Practice dealing with a lost or stolen device: If the worst happens and you lose one of your devices while traveling, you need to know what to do. Immediately go to Find My on another device or iCloud.com and mark the device as lost. If there’s a chance of getting it back, stop there. However, if you believe the device was stolen, your data is at risk, and tracking it is no longer useful, use Erase This Device in Find My to wipe it. Activation Lock will remain enabled to prevent anyone from reusing the device.

Increasing Travel Security for People Who May Be Targeted

Not all travel is fondue and gamelans. If you’re a journalist, activist, government employee, or corporate executive with access to sensitive data, you could be a target while traveling. This is particularly true if you are headed to countries like China, Russia, or others with authoritarian governments and powerful intelligence agencies. Along with the suggestions above, we recommend:

  • Be aware of local laws and government practices: It’s important to read up on regional laws regarding data access and potential government capabilities at your destination. Knowing what to expect can help you reduce your risks and take appropriate precautions.
  • Use caution with cellular access: Even if your carrier allows roaming, consider using a dedicated eSIM for international travel, separate from your personal one. That way, you can use local cellular networks without revealing your home number. Be aware that your traffic may be monitored.
  • Enable Lockdown Mode: If you’re concerned about your iPhone or iPad being targeted by local law enforcement or government intelligence agencies, turn on Lockdown Mode in Settings > Privacy & Security > Lockdown Mode. To increase security, it blocks most attachment types in Messages, complex Web technologies, incoming FaceTime calls from unknown callers, non-secure Wi-Fi network connections, and incoming invitations to Apple services. Plus, it excludes location information from shared photos, requires approval to connect accessories, and more.
  • Reduce and protect your use of cloud services: While using a VPN is essential, you should still avoid using cloud services much if government entities might have access to stored files. If you need to upload files, encrypt them first using the free and open-source Cryptomator.
  • Know how to disable Face ID and Touch ID: If you find yourself in a situation where you believe you may be compelled to unlock your iPhone or iPad with your face or fingerprint, press and hold the side or top button and either volume button to display the power off slider. This temporarily disables biometric authentication, requiring your passcode for the next unlock.
  • Use dedicated travel devices and accounts: If you’re traveling to a potentially hostile part of the world, we strongly recommend carrying only devices—preferably iPhones or iPads, which are more secure than Macs—configured to contain none of your personal data or regular accounts. Keep them with you at all times, assume they could be confiscated, and be aware you might be compelled to share passcodes or other account information. Create a separate Apple Account for such devices.

Best of luck in your travels! With just a little preparation, you can reduce the chances that something bad will happen during a vacation. If you’re traveling on business to somewhere more concerning, putting in additional effort could prevent truly problematic things from happening.

(Featured image by iStock.com/metamorworks)


Social Media: Security at home is one thing, but what about when you’re on the road? Many of the same precautions apply, but depending on your level of concern and where you’re going, additional techniques can help keep you and your data safe.

Never Save Your Work in These Locations

In every job that involves interaction with the public, amusing “Can you believe…” stories about customers abound. They’re often triggered by seemingly reasonable behaviors that experts recognize as problematic. A well-known example from the early days of personal computing is a college student who kept track of his floppy disk by attaching it to his fridge with a magnet, not realizing that magnetic fields could disrupt the disk’s magnetic patterns and corrupt files. The advice from tech support? “Don’t do that.”

No one is sticking floppies to their fridge anymore, but we still occasionally see the modern equivalent: saving data or documents in places that are likely to disappear. Just as you shouldn’t write the only copy of essential information on an easily erased whiteboard, you shouldn’t store important data in any of these locations:

  • Unsaved documents: While autosave is becoming more common, it isn’t universal and often doesn’t activate until a document has been saved for the first time. When you create a new document, always save it right away, before you do anything else. Otherwise, you risk losing all your work if the app crashes, the Mac kernel panics, or the power goes out.
  • Trash: We know, we know! Who would put something in the Trash that they want to keep? But it happens. Don’t do that! On the other hand, there’s also no reason to empty your Trash regularly unless you’re low on space. A good compromise is to choose Finder > Settings > Advanced and select “Remove items from the Trash after 30 days.” This way, you’ll always have a 30-day grace period to recover mistakenly deleted items.
  • Clipboard: Most people know that the clipboard serves as a temporary holding place, overwritten with each new Copy or Cut. However, if you’re unaware of this, you might write something lengthy, use Cut to place it on the clipboard with the intention of pasting it elsewhere, and then forget to do so right away, resulting in data loss on the next use of Copy or Cut. Always paste anything you cut immediately. Many utilities (such as Copy ‘Em, Keyboard Maestro, LaunchBar, Pastebot, and Raycast) provide clipboard history so you don’t lose clipboard data immediately, but you still shouldn’t rely on it persisting indefinitely.
  • Email Drafts mailbox: There’s nothing wrong with starting an email and coming back to it later to finish—that’s the point of the Drafts mailbox. It’s also a sensible way to begin a message on one device and complete it on another. However, avoid storing anything in Drafts for an extended period, and be aware that items there may disappear without warning. (And never, ever store anything in your email Trash mailbox—it will be deleted eventually.)
  • Temporary folders: Thanks to its Unix roots, macOS includes several temporary folders, one located at /tmp and others specific to each user. These folders are cleared regularly, such as when the Mac is restarted, left idle for a long time, or when drive space is low. Storing important data in a temporary folder is a digital version of Russian roulette.
  • Downloads folder: Although the Downloads folder isn’t inherently volatile, it’s unwise to store anything important there. You might forget about that document while tidying up and accidentally delete it, or you might use a cleanup tool in the future that does it for you.
  • USB flash drives: There is nothing wrong with putting files on a USB flash drive. However, avoid storing the only copy of an important file on one, as it is too easy for the drive to be lost or damaged.
  • Public computers, virtual machines, and sandboxed environments: This scenario is unlikely but not impossible. Imagine you’re working on a public computer in a lab and save a file on the desktop. When that computer reboots, it will likely delete all data to return to a fresh state for the next user. The same could apply to a virtual machine used for testing or a sandboxed environment that you log in to remotely.

There are also a few locations that generally aren’t problematic but deserve extra attention due to the higher likelihood of losing data:

  • Third-party app folders in ~/Library: Some apps store their data in folders they maintain within your user account’s Library folder. While this is acceptable for data managed by those apps, we advise against putting anything else in these folders since it’s impossible to know how the app might deal with data it doesn’t recognize during a cleanup or major update.
  • Desktop: It’s fine to work on documents stored on the desktop, but we recommend filing them away carefully when you’re finished. If you frequently move files in and out of your desktop, it’s all too easy to delete something important accidentally. Additionally, if you have iCloud Drive’s Desktop & Documents folder syncing enabled, you might unintentionally delete files from another Mac due to being in a different context.
  • Box, Dropbox, Google Drive, iCloud Drive: Cloud storage services are entirely acceptable locations for important data, but they all offer options that store files only online, downloading them only when necessary. These options may prevent online-only files from being accessible when you’re offline or from being backed up locally. Worse, if you share cloud storage with others for collaboration, they could accidentally delete your data. Be sure to enable any available version history options and ensure everything is backed up locally.
  • External drives or network storage: Many individuals and organizations store essential files and data on external drives and network storage. This approach is perfectly valid, provided that these locations are backed up. When designing your backup system, remember to include your external drives, network servers, and NAS devices. Lastly, if an external drive is encrypted, ensure that you have a backup of both its data and the decryption key.

If you want to avoid all these issues, save your files in your Documents folder and make sure you have a solid backup strategy.

(Featured image based on an original by iStock.com/shutjane)


Social Media: We won’t name names, but we’ve seen too many people saving important data in locations that are likely or even guaranteed to disappear. Here’s a list of places to avoid and another of spots that warrant caution.

New iPhone 16e Redefines Budget iPhone Choices

We know iPhones can get pricey—a top-of-the-line 1 TB iPhone 16 Pro Max costs $1,599, and that’s before AppleCare. To make the lineup more affordable, Apple has long sold the iPhone SE and kept previous years’ models available. Until February 18, you could buy a 64 GB iPhone SE for $429 or a 128 GB iPhone 14 for $599. Apple has now simplified the low-end choices by dropping those two older models in favor of the new iPhone 16e, which also starts at $599 for 128 GB of storage. It’s available in black or white.

Physically, the iPhone 16e is a cross between the iPhone 14 and the iPhone 16. Its case dimensions match those of the iPhone 14, and it has the older notch design instead of the iPhone 16’s Dynamic Island. However, the iPhone 16e incorporates the iPhone 16’s Action button and uses USB-C.

What the iPhone 16e doesn’t do is replace the third-generation iPhone SE in terms of price or size. At $599, it’s $170 more than the 64 GB iPhone SE and $120 more than the comparable 128 GB model. That’s a significant increase for the most affordable iPhone. Moreover, while the iPhone SE’s compact size made it popular among those with smaller hands and pockets, the iPhone 16e is significantly taller, wider, thicker, and heavier. Anyone moving from an iPhone SE will feel the difference.

In exchange for its higher price and larger size, the iPhone 16e delivers significantly more technology than the iPhone SE. It replaces Touch ID with Face ID, boasts a much larger, brighter screen, sports notably improved front and rear cameras, and is powered by an A18 chip that is 40% faster than the iPhone SE’s A15 Bionic and supports Apple Intelligence features. The Action button can be customized to perform nearly any function and will soon also provide access to Visual Intelligence. The iPhone 16e also offers satellite connectivity for Messages, Roadside Assistance, and Emergency SOS in areas without cellular coverage, and it can alert emergency services after a car crash. Finally, it’s even more water- and dust-resistant.

Screenshot

However, it’s also worth comparing the iPhone 16e to the iPhone 16, which starts at $799. That $200 premium gets you a lot, including a brighter screen, the Dynamic Island instead of a notch, a Camera Control button, a more advanced dual-camera system featuring a 12-megapixel Ultra Wide camera, a slightly more powerful A18 chip, 25-watt MagSafe charging with support for MagSafe accessories, and Ultra Wideband for precise Find My locating. Additionally, the iPhone 16’s camera system provides macro and spatial photography, as well as video features like cinematic mode, action mode, spatial videos, and macro recording. It may also deliver better optical image stabilization.

The only area where the iPhone 16e outperforms the iPhone 16 is in battery life. In Apple’s benchmarks, the iPhone 16e provides 12% to 18% longer runtime. The enhanced endurance is partly due to the power efficiency of Apple’s new C1 wireless communications chip. Apple also said it redesigned the internals of the iPhone 16e to accommodate a larger battery. The longer battery life may be especially welcome for those who expect to keep their iPhones for years.

Apple’s new C1 chip is a big deal, and the company wants to use it in future iPhone models to improve battery life and wireless performance. However, it’s worth keeping in mind that the C1 may suffer teething pains that Apple will address in software updates. Although Apple undoubtedly believes the C1 will work well, there’s no telling what will happen in the real world, and the company’s engineers may need to tweak it to address performance or reliability issues.

If you’re in the market for a new iPhone, what should you choose? The iPhone 16e is the best option for those on a tight budget since it’s the most affordable. (Last year’s iPhone 15, which is still available, starts at $699 and doesn’t support Apple Intelligence.) However, if you can afford that extra $200, the iPhone 16 is significantly more capable thanks to its superior rear camera system, Camera Control button, MagSafe compatibility, and Dynamic Island. For all the differences, check Apple’s iPhone comparison tool.

Finally, those seeking a smaller, lighter iPhone are out of luck. Their best hope lies with the rumored iPhone 17 Air, which is expected to arrive in September and could be thinner and lighter while maintaining the same height and width.

(Featured image by Apple)


Social Media: Apple has unveiled the iPhone 16e for $599 and discontinued the iPhone SE and iPhone 14. It’s much more capable than the models it replaces, but the iPhone 16 may be worth $200 more. Read our buying advice here:

When Purchasing a Fireproof Safe, Pay Attention to the Details

The devastating losses caused by the Los Angeles wildfires have underscored the need to protect data from catastrophic events. A traditional offsite backup—periodically moving a hard drive to another location—might not have sufficed in areas affected by wildfires, where many structures were destroyed. An online backup using a service like Backblaze or CrashPlan is often a better solution, although it can become costly for multiple Macs, and some individuals and organizations are uncomfortable storing their data online, even with encryption.

What about a safe? Would storing one or more backup drives in a safe provide adequate protection? Possibly, but the details are critical. Some safes are designed solely to guard against theft, focusing on preventing thieves from opening the door. However, paper ignites at 451ºF (it chars around 387ºF), and most house fires reach temperatures between 800ºF and 1200ºF, so you may think that all you need to do is look for a “fireproof” safe. That’s a good start, but paper is actually much more resilient than magnetic and optical media.

Fireproof safes come with ratings that indicate the internal temperature they can maintain, with the most common being:

  • Class 350: Safes maintain an internal temperature of 350ºF, suitable only for paper.
  • Class 150: Safes keep the interior below 150ºF, which should protect magnetic media.
  • Class 125: Safes maintain temperatures under 125ºF, appropriate for optical media.

It is also important to determine how long the safe can maintain that temperature. Generally speaking, a fireproof safe is rated for 1 or 2 hours, indicating it can maintain the specified internal temperature for at least that duration. Time ratings represent minimums, not maximums, so the actual protection time may be longer.

In most cases, the protection time is likely to be longer. That’s because safes are tested in furnaces at temperatures that can be two to three times hotter than the average house fire. For example, Underwriters Laboratory (one of several independent testing labs) conducts tests at 1700ºF or 1850ºF. Additionally, while a house fire may burn for several hours, the average fire will consume everything near the safe within 20 minutes and then move on.

Wildfires are a different story. In extreme conditions, wildfire temperatures can range from 1500ºF to 2200ºF, approaching or exceeding the testing conditions. Wildfires also last longer, so a safe in a destroyed building may remain in embers for hours or even days before it can be recovered.

While temperature over time is the main factor to consider when researching a fireproof safe, also look for two other variables being mentioned as well:

  • Water resistance: Where there’s fire, there’s usually water. Thousands of gallons of water, some of which will undoubtedly affect the safe. Not all fireproof safes are waterproof, so verify whether a specific safe can withstand being doused by firefighters.
  • Impact protection: If the floor collapses, a safe on an upper story could fall a considerable distance. If you are considering such a location, ensure the safe can withstand the impact. To simulate realistic fire conditions, the test may involve withstanding a 30-foot drop onto a concrete floor, followed by reheating.

Finally, remember that if your safe is in a fire, the heat will cause its insulation to swell up, rendering the lock useless, regardless of its type. Typically, you will need to hire a locksmith to access the safe using instructions from the manufacturer.

If you’re going to trust your data to a fireproof safe, do your research to ensure that whatever you buy will meet your needs for fire, water, and impact protection. It won’t be cheap—depending on the size and other factors, a good fireproof safe can cost many hundreds or even thousands of dollars. However, this is one area where you definitely shouldn’t cut corners.

(Featured image based on originals by iStock.com/phive2015 and Hanna Plonsak)


Social Media: If the wildfires in Los Angeles have you considering a fireproof safe to safeguard backups and important documents, make sure to research temperature ratings over time and be mindful of water and impact resistance.

What You Can Do with the December Wave of Apple Intelligence Features

The first set of Apple Intelligence features appeared in macOS, iOS, and iPadOS in October. Apple has now debuted the second set in the December releases of macOS 15.2 Sequoia, iOS 18.2, and iPadOS 18.2. Apple still considers them to be in beta, which is a nice way of saying that they may not work perfectly. However, they usually do what they promise.

Remember, Apple Intelligence features work only on a Mac with Apple silicon, an iPad with an A17 Pro or M-series chip, or an iPhone 15 Pro or any iPhone 16. Intel-based Macs and older iPhones and iPads can’t play. If you’ve been holding off on upgrading, this is a fine time to make the jump. Regardless, you must turn on Apple Intelligence, which you do on the Mac in System Settings > Apple Intelligence & Siri and in Settings > Apple Intelligence & Siri on the iPhone and iPad.

What can you look forward to with this second set of Apple Intelligence features?

Image Playground Helps Make Fun Images

With Image Playground, Apple is dipping its toe into AI-driven image generation. The standalone Image Playground app lets you create amusing images with text descriptions, either starting from scratch or from a photo. You can choose from two styles: Animation, which Apple describes as “a modern 3-D animated look,” and Illustration, which “offers images with simple shapes, clear lines, and colorblocking.” (A third Sketch style will appear in a future release, and you can use ChatGPT in Writing Tools to create images in many other styles.) You can also create images directly in Messages, Freeform, Keynote, and other apps.

Once you’ve entered a few words of description or selected a person, you can embellish the image by tapping the buttons for suggested themes, costumes, accessories, and places. Each addition causes Image Playground to generate a new image, and swiping left on that image pushes it to try again. Tap the ••• button to save or share an image you like. Saved images become available on all your devices.

Genmoji Spice Up Chats on the iPhone

Less ambitious but potentially more fun are Genmoji, which are custom emoji that you create with text descriptions. Want to emote about the cold to a fellow musician? Create an emoji featuring two cellos wearing scarves.

To do this, switch to the emoji keyboard, tap the Genmoji button to the right of the search field, and describe your desired emoji. As with Image Playground, you can keep swiping left on the generated image to create more variations. When you get what you like, tap it to insert it into your chat or document.

Remember that a single emoji sent by itself in Messages is quite large; two or three emoji are medium-sized, and inserting any more than that or adding text causes them to display at the smallest size.

Created Genmoji are added to your emoji collection on all your devices, but they’re actually stickers. You can remove them by tapping the ⊕ button in Messages, tapping Stickers, and using touch-and-hold on a Genmoji to access the Remove button. You can’t create Genmoji in macOS right now, but Apple has promised that feature for a future release.

Image Wand Cleans Up Apple Pencil Sketches

In iPadOS 18.2, the Notes app now offers an Apple Intelligence-powered Image Wand tool for those taking notes with an Apple Pencil. Make a rough sketch with your Apple Pencil, select Image Wand, draw a circle around your sketch, and Image Wand will turn it into a polished image. If your circle also contains text, Image Wand considers it when building the final image.

Visual Intelligence Explains What You See

When you upgrade to iOS 18.2 on an iPhone 16, the Camera Control button gains a new capability: Visual Intelligence. Press and hold it (whenever the Camera app isn’t already open, since that will trigger video recording), and Visual Intelligence presents Ask and Search buttons on either side of the shutter button. Tapping Ask causes ChatGPT to describe the image and lets you pose follow-up queries, and tapping Search performs a Google reverse image search; tap any of the results to load it. (If you can’t immediately tap Ask or Search, press the Camera Control button again or tap the shutter button to freeze the image temporarily.)

Siri Channels ChatGPT

Perhaps the most anticipated enhancement to Apple Intelligence is the integration of ChatGPT into Siri. Unfortunately, if your goal is to converse fluidly with ChatGPT, you may be better off using OpenAI’s ChatGPT app, perhaps triggered by the Action button or a widget. The problem is that unless you explicitly direct a Siri query by starting with “Ask ChatGPT,” Siri may try to answer with its own Web search or trigger a command, leading to inexplicable and unhelpful responses. Even when you get Siri to ask ChatGPT for a response, there’s no option to have it read back to you aloud, as with ChatGPT’s Advanced Voice Mode.

If you want to use ChatGPT through Siri, turn the feature on in Settings > Apple Intelligence & Siri > ChatGPT. While you’re there, you’ll probably want to turn off Confirm ChatGPT requests, which otherwise ask if you want to use ChatGPT every time it comes up. Although it may not be obvious, once you’re in a conversation with ChatGPT, you can keep talking as long as the Siri animation continues around the edge of the screen. Unfortunately, you cannot scroll back to any previous response while Siri is channeling ChatGPT; for full transcripts, you must revert to the ChatGPT app or website.

ChatGPT Enhances Writing Tools

The final place ChatGPT appears in Apple Intelligence is in Writing Tools, which may be more useful than its Siri integration. The new Compose option leverages ChatGPT to generate content wherever you’re writing, and you can also use it to create images using ChatGPT’s image-generation capabilities. Writing Tools also now allows users to request their own changes to selected text (including recasting it as a haiku, for example) instead of relying solely on the canned options to make the text friendlier, more professional, or more concise.

To do this, bring up Writing Tools in any app (by choosing Edit > Writing Tools > Show Writing Tools or Control-clicking selected text and choosing from the Writing Tools menu). Tap Compose and describe what you want ChatGPT to create. If it’s not quite what you want, which is likely, keep asking for refinements or go in a different direction.

What’s Next for Apple Intelligence?

Although this second wave of Apple Intelligence features largely fulfills Apple’s main promises, a few major additions remain for 2025. Most notable are significant changes to Siri that will enable it to take your personal context—your email, messages, and photos, for instance—into account. Siri will also gain onscreen awareness to include what you see in its responses. Finally, Apple is giving Siri access to hundreds of new actions in Apple and third-party apps, which should make it more capable of acting on your behalf. The other notable upcoming change is Priority Notifications, which will evaluate the notifications from all your apps and help you focus on the most important ones.

We also hope Apple will continue to refine and improve the existing Apple Intelligence features. While they’re well integrated into the overall Apple experience, they seldom measure up to ChatGPT, Claude, Gemini, and other leading AI systems.

(Featured image by Apple)


Social Media: We look at the latest wave of Apple’s AI features and help you start using them for discussions with ChatGPT, creating images, making custom emoji, learning about your environment, and more.

Website Owners: Identifying Copyright Infringement Link Insertion Scams

We regularly warn Internet users about online scams and phishing attacks. Most of these are relatively easy to identify and avoid once you’re aware of telltale signs. Unfortunately, we’ve encountered a newer type of scam that’s more difficult to identify, partly because it plays on fears of legal action.

Website owners are the target of this scam email, which purports to come from a lawyer. The message states that an image on your site has been used without permission. Such a claim is all too believable for many, especially those who may not have been as careful about usage permissions in the distant past as they are today. The message includes a link to the image, a link to the purportedly infringing page, and a threat to initiate legal action if certain actions aren’t taken within five business days

Unusually, the email doesn’t ask you to take down the infringing image or pay a retroactive licensing fee. Instead, it says you must credit the image’s copyright holder and include a link. Such a simple request seems like a huge win—instead of paying a licensing fee or worrying about being sued, you can twiddle a little HTML and move on with your life.

Don’t do it! This is what’s called a “link insertion scam.” It exploits the search engine optimization principle that links on reputable sites provide legitimacy to linked sites, helping them move up in the search rankings. Unfortunately, the reverse is also true; linking to a scammer from your website will cause Google and other search engines to penalize your site in the search rankings.

Unfortunately, these copyright infringement scams look legitimate at first glance, as you can see in this example. The From and Subject lines don’t seem forged or malformed, and there are no obvious grammatical errors or indications that the writer doesn’t speak fluent English. And when you click the link in the signature, you end up at what appears to be the website of a real law firm. What should you do if you receive a message like this?

First, don’t panic. Just because the message looks legitimate doesn’t mean it comes from a real lawyer. Also, don’t call your lawyer unless they’re willing to work for free. You can save stress, time, and money by evaluating the message yourself.

A few details in the message suggest that it’s not real:

  • The domain in the From line’s email address—elitejusticeadvisors.biz—sounds sketchy and doesn’t match the company name.
  • The Subject line of “DMCA Copyright Infringement Notice” sounds official, but those familiar with the DMCA will know that it can be used only for a formal notice-and-takedown process, not to make demands for attribution or payment. But most people won’t know that.
  • The message is addressed to the generic “Dear owner of,” whereas legitimate messages from a lawyer would be addressed to a specific entity.
  • The required link URL points to a telecom news site in Sri Lanka, and it’s odd that an Arizona lawyer would be working for such a client.
  • The example of the purportedly infringing image is hosted at Imgur, a consumer image-hosting site known for funny pet pictures and cringeworthy GIFs. Legal firms would always use some sort of case management site.

Those details may feel wrong, but they’re insufficient to prove it’s a scam. You’ll need to dig deeper. Here are some ways you can do that:

  • Investigate the domain: Do a Web search on the domain in question: elitejusticeadvisors.biz. Because others have written about this scam, articles identifying it as a scam will appear on the first page of the results.
  • Search for the lawyer and firm: The lawyer’s name is too generic to yield revealing results, but if you do a Web search on “Dean Parker Commonwealth Legal Services,” you’ll once again see that others have identified it as a scam.
  • Check a state bar association directory: Most state bar associations or state courts have a searchable directory of licensed legal professionals. A quick search of the State Bar of Arizona’s member directory reveals that no “Dean Parker” is licensed in Arizona.
  • See if the headshot matches a real person: If the website provides a headshot, you can copy the image (Control-click it and choose Copy Image) and paste it into the TinEye reverse image search engine. Since all the results say “generated.photos,” it’s a good bet that the image was AI-generated.
  • Search for the company’s full name and address: As with the name of the lawyer, the generic-sounding name of the law firm will probably match other companies. However, if you search for the full name and address, you’ll likely turn up articles about it being fake.
  • Visit the address virtually: With Apple Maps and Google Maps, you can verify that a business is present at a location (or not) and often view the offices using Google Street View. Both mapping tools show no law firm at the provided address. Additionally, the building does not have a fourth floor, as specified in the address.
  • Ask ChatGPT: Now that ChatGPT has access to current Web information, it’s worth pasting the complete contents of the message into a ChatGPT conversation and asking it to tell you about the message. Start generally, but then ask if it thinks the message might be a scam, and if so, to suggest ways you could verify your suspicions.

Some of the above search suggestions identify the scam only because the scammer has reused the same company name, lawyer name, physical address, and website. If you were the first to be targeted by a new scam, the state bar association search and physical address check would be the most likely to expose it.

Let us leave you with an important caveat. You shouldn’t assume that all copyright infringement messages are scams. A legitimate DMCA takedown notice will ask you to remove the content, and a real copyright infringement message—probably from a company that specializes in such matters rather than a lawyer—will likely demand payment. In both cases, take down the offending image right away. If you really were using an image without permission, some payment may be required, and if the amount feels excessive, contact a lawyer specializing in copyright infringement cases. They may be able to negotiate a lower payment or point out issues that will make the claim go away.

(Featured image based on an original by iStock.com/Olivier Le Moal)


Social Media: If you receive what looks like a copyright infringement message complaining about an image on your website, don’t panic—it might be a scam. We help you identify such scams and explain what to do if the message turns out to be real.

A Few of Our Favorite Things: Tech Edition

The holiday season is fast approaching, but we’re asked to recommend tech gear year-round. Here are some recommendations if you’re looking for a geeky gift for that special someone or need to supplement your tech toolkit with new or updated equipment. We don’t have personal experience with all these items, and there are undoubtedly many worthy alternatives—next time we chat, let us know about peripherals you’ve particularly liked. Where possible, we provide links to the manufacturer’s product page and to Amazon, where prices are sometimes lower.

External SSD

All Macs now use solid-state storage internally, and the pricing of external solid-state drives now makes them attractive for both additional storage and silent backups. SSDs also provide the ultimate performance for demanding workflows. The Samsung and Crucial SSDs are good general-purpose drives; look at the OWC Envoy Pro FX for high-performance tasks.

External Hard Disk Drive

For extensive backups and massive archives, you need a large external hard drive. They come in sizes up to 20 TB, and you can pay less than $20 per terabyte, although $20–$30 per terabyte is more common. It’s impossible to recommend specific models without knowing how much storage you need, but check out products from these manufacturers. Because hard drive prices fluctuate wildly, visit diskprices.com to identify current deals on new drives.

  • Seagate: Seagate offers a collection of desktop and portable drives under its own name and the LaCie brand. Apart from some of the larger LaCie drives, most are aimed at consumers.
  • Western Digital: Although some suggest that Western Digital drives are less reliable than Seagate’s, many people like the company’s wide variety of external hard drives.
  • OWC: Other World Computing sells desktop and portable drives with an emphasis on RAID storage and professional uses. OWC also offers enclosures into which you can install bare drives purchased elsewhere, which can save money if you want to upgrade the drive over time.

External Displays

You can find a wide array of displays that work with a Mac, with Apple’s Studio Display leading the pack in both features and price. It’s a 5K display that provides unparalleled sharpness at its standard pixel-doubled resolution of 2560×1440. There’s little direct competition—LG offers the main 5K display that’s cheaper. If that still exceeds your budget, check out the 27-inch 4K displays from Alogic and Asus, which connect via USB-C. Dell and BenQ also make high-quality screens that connect using Thunderbolt. Note that these third-party displays don’t include webcams and generally feature subpar speakers compared to the Apple Studio Display, so building a comparable display would require a separate webcam (or an iPhone using Continuity Camera) and speakers.

Laptop Chargers

Although all MacBooks come with a power adapter, you might want additional chargers that stay plugged in wherever you work or take up less space in your laptop bag. Plus, Apple’s chargers, though high quality, are expensive and large. Consider these alternatives, keeping in mind that fast charging requires higher wattages than standard charging (70W for the M3 MacBook Air, 96W for the 14-inch MacBook Pro, and 140W for the 16-inch MacBook Pro). Extra ports are often welcome, and the OneAdaptr chargers work in 200 countries.

USB Hubs

There are lots of reasons to want a USB hub, and your needs will push you toward one product or another. We chose three options: the Anker 555 provides many different types of ports, the Anker 10-port hub provides numerous USB Type-A ports, and the Satechi 4-port hub offers USB-C ports.

Thunderbolt Docks

USB hubs are sufficient for many situations, but for more demanding setups, you’ll want a Thunderbolt dock that enables you to connect multiple external displays, hard drives, and Gigabit Ethernet, all while using high-wattage charging. The Sonnet and CalDigit docks boast the most ports in horizontal and vertical form factors, respectively, and the OWC dock trades some ports for portability.

Non-Apple Pointing Devices

Some people dislike trackpads, and others aren’t fond of Apple’s Magic Mouse. Luckily, there are plenty of alternatives. Although most Bluetooth mice will work with the Mac, additional software may be necessary to control tracking speed, extra buttons, or scroll wheels. Unusual pointing devices like the Kensington trackball and Contour RollerMouse may be appreciated by those suffering from hand or wrist pain from mousing.

Non-Apple Mac Keyboards

All Macs other than the Mac mini come with a keyboard, of course, but if you’re not a fan of the feel and minimal key travel of Apple’s keyboards, you might consider an alternative. You’ll need to decide if you want a full-size keyboard with a numeric keypad or a compact keyboard that takes up less space on your desk—there are also various sizes in between. Also, keyboards use different switches under their keycaps, so it may require experimentation to find what you like best. It’s worth buying a keyboard aimed at the Mac market to ensure it has or can be configured with the correct keys. The recommendations below should get you started; also check out other products from these manufacturers.

iPad Keyboards

Apple makes some of the best keyboards for the iPad, but they don’t work with all older models. The company makes the Magic Keyboard for the M4 iPad Pro models, the Magic Keyboard that works with the iPad Air and earlier iPad Pro models, and the Magic Keyboard Folio for the 10th-generation iPad. If you want to spend less, leave out the trackpad, or have a different case design, look into the alternatives.

Small Device External Batteries

Although Apple continuously works to improve battery life for the iPhone, iPad, Apple Watch, and AirPods, there will always be situations—travel, camping, non-stop use—where an external battery is a lifesaver. That’s especially true for older devices whose batteries don’t last as long as they used to.

MagSafe Chargers for the iPhone

Wired charging will always be faster and more efficient than wireless charging, but the convenience of MagSafe charging for the iPhone is compelling. As a bonus, MagSafe chargers can also power wireless charging cases for the AirPods Pro, and some, like the KUXIU X55, feature a puck for recharging the Apple Watch.

Let us leave you with a final piece of advice. For many of these product categories, you’ll find a dizzying array of alternatives at bargain basement prices from no-name Chinese manufacturers. While it’s impossible to make blanket assertions, we recommend sticking with reputable companies that have been serving Apple users for years. Even if their products are somewhat more expensive, they’re less likely to cut corners on manufacturing quality and safety and more likely to provide support in the event of problems.

(Featured image by iStock.com/Gatot Adriansyah)


Social Media: If you’re looking for a geeky gift for the Apple user on your holiday list or need to bolster your tech toolkit with new or updated gear, read our recommendations for a wide variety of peripherals.