Posts

Control Window Tiling in macOS 15 Sequoia

One of macOS 15 Sequoia’s most noticeable additions is a new form of window tiling. Drag a window to the menu bar to expand it to fill the screen, to the left or right edge to resize it to half the screen, or to a corner to resize it to that quarter of the screen. As you drag, a white outline shows what will happen when you drop the window. Unfortunately, accidentally invoking window tiling can be surprising and disruptive. The easiest way to ensure that dragging windows tiles them only when you want is to open System Settings > Desktop & Dock, scroll down to the Windows section, and turn off “Drag windows to screen edges to tile” and “Drag windows to menu bar to fill screen.” The important setting to leave turned on is “Hold Option key while dragging windows to tile” because from now on, your windows will tile only when you Option-drag them.

(Featured image based on an original by iStock.com/Jakob Berg)


Social Media: Those who are disconcerted by dragged windows suddenly resizing accidentally in macOS 15 Sequoia, take note: you can tweak settings to make Sequoia’s new window tiling feature activate only when you want.

Don’t Listen to Anyone Who Tells You to Drag a Text File into Terminal

In macOS 15 Sequoia, Apple made it more difficult to bypass Gatekeeper to run apps that aren’t notarized. (Notarization is one of the ways Apple ensures that apps distributed outside the Mac App Store are unmodified and free from malware.) Cybercriminals have responded to this increase in security with a new social engineering attack. They provide the victim with a disk image, ostensibly to install some desired piece of software, instructing the user to drag a text file into Terminal. Doing so executes a malicious script that installs an “infostealer” designed to exfiltrate a wide variety of data from your Mac. The simple advice here is to treat any guidance to drop a file into Terminal with extreme suspicion—no legitimate software or developer will ever ask you to do that.

(Featured image based on an original by iStock.com/Farion_O)


Social Media: Thing #17 to never do: Follow instructions to drop a text file into Terminal. It’s a great way to install malware and let cybercriminals steal your passwords, financial information, and more.

Use Guided Access for Securely Allowing Others to Use an App on Your iPhone or iPad

iPhones and iPads are highly personal devices, but you might want to let someone else use a particular app on yours without letting them poke through Messages, Mail, and Photos. For example, a child could play a game, a volunteer could check in attendees, or a friend could take photos. To allow this, Apple created Guided Access, which you turn on in Settings > Accessibility—give it an easily remembered passcode and decide if you want to let the display auto-lock. Then, to turn on Guided Access, open the app you want to share and triple-click the side or top button. Options let you control buttons, the accelerometer, software keyboards, touch input, and a time limit. To end a Guided Access session, triple-click the side or top button, enter the Guided Access passcode, and tap End.

(Featured image by iStock.com/Userba011d64_201)


Social Media: If you’d like to allow a child, friend, or colleague to enjoy a specific app on your iPhone or iPad while keeping them focused and preventing access to everything else on the device, check out Apple’s Guided Access feature.

Watch Out for PayPal Invoice Phishing Scams

We’ve seen an uptick in fake invoices from scammers using PayPal. Because they’re being sent through PayPal itself, spam filters won’t catch them, and they have few of the usual markers of phishing email (but look for sketchy names and email addresses at the top). Some are even forged to appear as if they come from Apple. Never pay a PayPal invoice that you can’t tie directly to something you’ve ordered, and don’t call the number listed—the scammer will try to convince you that the invoice is real. If you receive one of these invoices, click the “Report this invoice” link at the bottom to help protect others who might have received it, and forward the message to phishing@paypal.com. Don’t mark the invoice as spam, though, since that will train your email client to be suspicious of legitimate messages from PayPal.

(Featured image by iStock.com/Moostocker)


Social Media: Beware of PayPal invoice scams that might even appear to come from Apple. Should you receive one, report it to PayPal to help protect other people, but don’t mark the message as spam.

New Seventh-Generation iPad mini Adds A17 Pro for Apple Intelligence

Although the first wave of Apple Intelligence features won’t upend the user experience for most people, Apple is pushing hard to ensure that all its new devices can participate. That’s largely what’s behind the recently released seventh-generation iPad mini. It’s physically unchanged other than a few new colors, but under the hood, the iPad mini sports an A17 Pro processor that makes it compatible with Apple Intelligence. Other changes from the previous generation include Apple Pencil Pro support, 128 GB of storage at the base level (up from 64 GB), 10 Gbps USB 3 (twice as fast), Wi-Fi 6E and Bluetooth 5.3 (up from Wi-Fi 6 and Bluetooth 5.0), and cellular support only via eSIM (no more physical nano SIM). The price still starts at $499, with cellular connectivity adding $150. It’s a minor update, but one that keeps the iPad mini up to date for those who prefer a more compact iPad design.

(Featured image by Apple)


Social Media: Apple has updated the iPad mini with an A17 Pro chip for Apple Intelligence, along with more storage, faster connectivity, and support for the Apple Pencil Pro. It’s still $499 and remains an excellent option for anyone wanting a smaller iPad.

Apple’s Tips App Provides Extensive User Guides and Helpful How-Tos

Apple has included the Tips app with the iPhone and iPad since iOS 8 in 2014 and on the Mac since macOS 10.14 Mojave in 2018. Initially, it didn’t contain much useful content, and many longtime users ignored it. However, Apple has significantly increased the amount of information in Tips over time, adding device-specific tips, full device and app user guides, highlights of new features, and more. Many tips even include short demonstration videos. Tips is worth exploring or referring to the next time you have a question. Be sure to encourage anyone you know who’s new to the iPhone, iPad, or Mac to take a look—it even helps them practice key gestures!

(Featured image by Adam Engst)


Social Media: If you haven’t explored Apple’s Tips app on the iPhone, iPad, or Mac recently, check it out. Apple has added a lot more content, including device and app user guides, highlights of new features, and interactive practice guides.

Beware Fake “Sextortion” Scams

All those data breaches are coming back to haunt us. Once our phone numbers and addresses began to be leaked, it was only a matter of time before scammers would personalize their attacks to make them seem more real. The latest “sextortion” scams purport to have compromising video of you taken from your computer’s webcam, backing it up with your phone number and a Google Street View-like image that matches your leaked address. They make a lot of claims and dire-sounding threats, but talk is cheap, and there’s nothing behind them. Do not pay the scammers!

(Featured image by iStock.com/Thapana Onphalai)


Social Media: Scams are starting to incorporate personal information stolen in data breaches, so you may get “sextortion” threats that purport to know your phone number, address, and more.

Reveal Mac Window Proxy Icons Permanently with This Setting

We’re big fans of the Mac’s window proxy icons, those little icons that appear in window title bars next to the filename. They’re not just cosmetic—you can use them just like the Finder icon for the open document. You can drag one to Mail to attach the document to a message, to a Web browser to upload it, or to any other location you can drag a document’s icon in the Finder. You can also drag a proxy icon for a folder from the title bar of its Finder window to Open and Save dialogs to navigate to the folder. In macOS 11 Big Sur, Apple hid the proxy icon until you moused over the filename, but starting in macOS 12 Monterey, the company provided an option to show them all the time. To enable it, select System Settings > Accessibility > Display > Show window title icons.

(Featured image by Adam Engst)


Social Media: People who like using the Mac’s window proxy icons (and if you don’t know about them, you should!) can make them visible at all times with an option deep within System Settings. Here’s how to find it and what you can do with proxy icons.

Apple ID Renamed to Apple Account in Latest Operating System Releases

In macOS 15 Sequoia, iOS 18, iPadOS 18, and watchOS 11, Apple has officially renamed Apple ID to Apple Account. The new name is a slightly more sensible term because you can sign in to an Apple Account that holds your information, whereas an Apple ID was primarily an identifier—it’s an email address—that didn’t inherently imply that it stored data. The name change is mostly a distinction without a difference, but you should be aware of it when reading support documentation or tech articles. You’ll see the new term in System Settings on the Mac and Settings on the iPhone and iPad.

(Featured image based on an original by iStock.com/Armastas)


Social Media: Apple has renamed Apple ID to Apple Account everywhere as of macOS 15 Sequoia, iOS 18, iPadOS 18, and watchOS 11. Nothing has changed functionally, but keep it in mind when reading tech articles or support documentation.

Restrict Access to Sensitive Apps in iOS 18 and iPadOS 18

Do you worry about family members with whom you’re otherwise happy to share your iPhone passcode reading your private diary in a journaling app? Or perhaps you want to keep your child out of apps where they could cause mischief. A new feature in iOS 18 and iPadOS 18 lets you use Face ID or Touch ID to restrict access to specific apps, optionally hiding them in the process. Touch and hold the app’s icon on the Home Screen, and tap Require Face/Touch ID. When prompted, either tap Require Face/Touch ID to leave the app’s icon visible on the Home Screen but restrict access or tap Hide and Require Face/Touch ID to restrict access and hide the icon. Protected apps only open after you authenticate with Face ID or Touch ID; hidden apps can be accessed only from the Hidden folder in the App Library after authenticating. (To reach the App Library, swipe left repeatedly on your Home Screen, then scroll to the bottom to find the Hidden folder.)

(Featured image by iStock.com/SasinParaksa)


Social Media: Keep prying eyes—or mischievous children—out of sensitive or important apps by requiring Face ID or Touch ID access before the app opens. You can also hide such apps so they appear only after you authenticate.