Connect with us

Technology

Why does Apple make it so hard to share the Vision Pro?

Published

on

Why does Apple make it so hard to share the Vision Pro?

Shortly before The Verge published its review of the Apple Vision Pro, I put it on to sit for some photos. The review unit had been fitted for our editor-in-chief Nilay Patel, but I’d worn it a few times as a guest and had a surprisingly good experience. That afternoon, though, I foolishly decided to skip the typical guest setup, which involves about a minute of calibration for the Vision Pro’s eye-tracking cameras. I put the thing on, and it didn’t work at all.

The Vision Pro’s cameras, I quickly realized, were expecting somebody else’s eyes. The cursor darted around wildly or refused to move. It wasn’t an unexpected outcome, but it drove home an inconvenient fact: not only would I need to go through the setup again, I’d need to do it every time I wanted to use the headset.

As The Verge has covered the Vision Pro’s release, we’ve run into multiple ways that Apple hamstrings device sharing, from not supporting multiple accounts to making the process of buying extra parts a pain. This isn’t just a computer you use alone, it’s apparently one you own alone — for reasons that seem unnecessary at best and user-unfriendly at worst.

Despite its solitary reputation, the Vision Pro has obvious multiuser appeal

To set the stage here, I want to make a slightly counterintuitive claim: the Vision Pro, despite its solitary reputation, feels built for sharing. In its bulky, expensive first-generation form, it isn’t something most people will want to wear or carry around all day. Its clearest use is either as a special-purpose tool for tasks like 3D design, or as a personal entertainment device, like a virtual TV set-top box or game console. These are exactly the kinds of products that might often be used by one person at a time, but tend to be owned across a household — or workplace — and frequently passed around.

Advertisement

The Vision Pro’s hardware facilitates this surprisingly well. Unlike some VR headsets, the device’s Solo Knit Band is adjusted with a single simple-to-use dial; there’s no need to change the sizing by readjusting awkward velcro straps. Changing the bands is also easy, if needed. It requires a light seal that’s fitted to your face — and there are a whopping 17 possible sizes — but that’s attached with a simple-to-swap magnetic snap. There’s even a simple biometric login option: the face-tracking cameras mounted inside.

It’s easy to imagine a world where this translates into making the Vision Pro more valuable as a multiuser device. Like a lot of people, I tend to share electronics — my criteria for a good entertainment device include whether my husband will use it, too. I don’t see myself wearing the Vision Pro all day for work, but I could imagine putting one on for a couple of hours to play VR / AR games, then handing it off so he can watch TV on a virtual big screen after I fall asleep. Yet the Vision Pro feels designed to undermine that fantasy at every turn.

The most obvious problem is the lack of multiple accounts or profiles. The Vision Pro allows precisely one person to have a permanent account tied to their Apple ID. That’s similar to the iPad and iPhone, but unlike nearly every other computing device in my household, from my Android phone to my MacBook to my husband’s humble Nintendo Switch. Even the Meta Quest system, which tied hardware to personal Facebook or Meta logins a few years ago, lets you swap between up to four accounts!

On the iPhone, the single-user setup is annoying for privacy and customization reasons, but makes a good deal of sense. The lack of multiple user support on the iPad makes far less sense — we have complained about it for years — but at least some iPads are relatively inexpensive. 

This headset is $3,499 and only one person in a household can use it fully

Advertisement

The Vision Pro is $3,499 and only one person in your household can ever use it fully, which makes no sense at all. The privacy issues are technically there on the Vision Pro — letting anyone else use it without setting restrictions in guest mode grants them access to everything you’ve got on the headset, including your messages. But as my experience demonstrates, they may not even be able to use it well enough to get that far. You can start a guest session by holding the Vision Pro’s left-side hardware button for four seconds, but you can’t store a second user’s information so they can log in quickly next time without calibration. Basically, imagine if every time you passed an iPad to somebody else in your family, they had to spend a minute poking colored dots.

Then there’s the matter of getting an extra light seal. As I mentioned, I felt fine using a Vision Pro not fitted for me, but others have had problems. Verge product manager Parker Ortolani, for instance, found the Vision Pro with Nilay’s seal size too small and said it leaked light into his eyes. An extra seal costs $199, and you can only buy it one of two ways: ordering online and scanning your face with a Face ID-equipped iOS device, or going in person to an Apple Store and getting a scan done there. Verge video director Owen Grove tried the latter, and his experience wasn’t great.

“I needed to set up an appointment for [a] demo I didn’t want to just buy an extra light seal,” Owen told me. He’d called beforehand to confirm the seals’ availability, only to discover after the half-hour demo that most were sold out, including his size, which the store told him to buy online instead. In general, not being able to simply buy a few different sizes and figure out what works best is inherently limiting for a single user — and makes it almost impossible to share with a few people in a family or workplace.

Things get even more complicated if one or more potential users wears glasses, although this feels like more of an inherent inconvenience than a deliberate roadblock. The Vision Pro uses Zeiss-made prescription lens inserts, which require initial pairing with a passcode stored in Apple’s Health app or a physical card. On the bright side, the interface lets you store multiple lens pairings, so it doesn’t seem like you have to do this every time.

Some of these annoyances might get ironed out over time, as Apple has removed other awkward Vision Pro design quirks with software updates. The company is clearly trying to familiarize people with a new class of computer, and right now that means controlling the experience as closely as possible. If the Vision Pro sees any level of success, things like the demo requirement could fade away. Apple may roll out more options specifically for business or education customers, too, like the Shared iPad feature that allows for some multiuser support.

Advertisement

But Apple has also held fast to the idea that its devices are made for just one person, and with the Vision Pro, it can enforce that idea in ways it couldn’t before. Even as the hardware gets cheaper and more streamlined, it could easily insist on a fundamentally single-user experience — and that’s a shame, when the Vision Pro seems built for so much more.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Meet the Pentagon’s AI bro squad

Published

on

Meet the Pentagon’s AI bro squad

Hello and welcome to Regulator, a newsletter for Verge subscribers covering the broligarchs, the influencers, and the (potentially conscious) artificial intelligence models scrambling for power in Washington. If you’re not a subscriber yet, assert your humanity against the will of the machines by signing up here.

Very important news: Do you want to tell me stuff and see it printed in Regulator? Well, now you can, because we have a new tip line! Send all commentary, cool information, and ~secrets~ to tina.nguyen+tips@theverge.com.

The Pentagon’s private-sector A-Team

This morning, in advance of a meeting between Defense Secretary Pete Hegseth and Anthropic CEO Dario Amodei, my colleague Hayden Field and I published a story about the Pentagon’s hardball contract renegotiations with Anthropic. The stakes are higher than it should reasonably be, with the Pentagon continuing to designate Anthropic a “supply-chain risk” if the company doesn’t comply with their demands about their acceptable use policy.

In a post-meeting readout, Axios reported that Hegseth brought several other senior Defense officials to the meeting in an attempt to show that the Pentagon was taking the dispute “seriously.” But in a post-DOGE Trump administration run by broligarchs, it’s always worthwhile to check the attendees’ bios. Some of them were normal senior officials who’d spent their careers in government and military work, but the others have somewhat unusual backgrounds:

Advertisement
  • Pentagon CTO Emil Michael, who we reported has been spearheading negotiations with Anthropic. Michael may be familiar to longtime Verge readers and followers of Silicon Valley corporate drama as the former second-in-command at Uber when Travis Kalanick was CEO. Michael was pushed out in 2017 after an investigation found that he, and several other top executives that called themselves the “A-Team,” perpetuated a culture of sexual harassment at the company.
    • For anyone curious about his history on surveillance: During a 2014 dinner with several journalists, Michael suggested that Uber hire opposition researchers to gather personal “dirt” on reporters publishing unfavorable news, suggesting that he’d wanted to target one female reporter who had recently criticized the company for its culture of misogyny. This was also around the time that Uber drew controversy for an internal tool known as “God Mode,” which employees used to track the movements of its users, including one BuzzFeed journalist who was writing about an Uber executive.
  • Deputy Secretary Steve Feinberg, the founder of the private equity firm Cerberus Capital Management, which manages roughly $65 billion in assets and specializes in “distressed properties.” Feinberg, who’s widely blamed for the death of the auto manufacturer Chrysler, was also an early supporter of Donald Trump, donating to his 2016 presidential campaign and serving on the president’s intelligence advisory board in 2018. During his 2025 Senate confirmation hearing, Feinberg touted Cerberus’ investments in several companies involved in national security, saying he had “significant experience with the Pentagon as a contractor and understand[s] how it functions and is organized.”
    • At the time, Democrats raised concerns that Feinberg would have conflicts of interest due to Cerberus’ numerous investments in defense companies such as DynCorp. (That year, DynCorp settled a lawsuit with the Department of Justice over allegations that it had “knowingly inflated subcontractor charges under a State Department contract to train Iraqi police forces.”)
    • In 2023, while Feinberg was still at Cerberus, the firm launched Cerberus Ventures, a venture capital arm that invests in early-stage companies that address national security issues in critical infrastructure.
  • Hegseth’s chief spokesperson, Sean Parnell, an Army veteran who, in 2021, attempted to run for an open Senate seat in Pennsylvania. While he won Trump’s endorsement in the heated Republican primary, he was forced to drop out in November after his ex-wife made several allegations of serious physical and psychological abuse during a custody hearing. She was afforded full legal custody. (Dr. Mehmet Oz, now serving in the Trump administration, subsequently won the nomination.)

Feinberg and Michael’s presence should draw eyeballs. Yes, they both have some amount of defense industry experience: Michael was a White House fellow during the Obama administration, and spent two years as a special assistant to Defense Secretary Robert Gates at the Pentagon, which isn’t nothing. Feinberg has clearly spent time with defense contracts. But one must fully appreciate the rapacious business mindset that private sector types love to bring into the government — especially with high-stakes negotiations such as this. Parnell’s presence, meanwhile, makes sense within the context of “being the spokesman for Pete Hegseth.”

The single-supplier shuffle

One topic Hayden and I didn’t get to explore more was the “single-supplier vulnerability” issue, but it’s turning into a crucial factor in negotiations.

In 2024, the Biden administration released a national security memorandum on the use of artificial intelligence, which laid out several directives regarding the protection of the supply chain. Among them was a directive for the Department of Defense to maintain contracts with at least two frontier AI labs that were cleared to handle classified information, in order to prevent a scenario where one compromised vendor could take down an entire IT system. But as early as the summer of 2025, I’m told, the Trump administration was trying to address that vulnerability. While they had signed separate contracts with Anthropic, Google, xAI, and OpenAI, only Anthropic’s model was cleared for classified use when Hegseth published his memo outlining his new AI policy in January.

This has placed the Pentagon in a tight situation: Even if they successfully cut out Anthropic and go through the arduous process of making every defense contractor remove Claude from their workflows, they would risk being out of compliance with the Department’s own guidelines, to say nothing of common sense. (Avoiding single-supplier vulnerability is a very basic practice in the tech industry.)

It certainly provides more context to the Pentagon’s decision last night to suddenly grant xAI’s Grok access to classified systems, even though Grok is widely considered the least capable of the available models. While The New York Times reported that Google is also close to signing a deal allowing the Pentagon to use Gemini for classified work, defense insiders view Gemini as a quality rival to Claude, while xAi’s Grok “is not considered as advanced or as reliable as Anthropic’s.” OpenAI is not close to a deal, as the company reportedly believes that it must improve ChatGPT’s safety features before deploying it on classified networks.

Advertisement

So let’s do the math. You have four AI models, and you’re required to work with two of them. Your choices are:

1) A company with a pretty good AI model and increasingly flexible morals

2) A company with the best AI model, but which refuses to let you use it for autonomously killing people without human input

3) A company whose AI model isn’t secure enough to deploy yet

4) A company whose AI has racist hallucinations and generates child porn, and that you don’t consider “advanced [or] reliable”

Advertisement

If you can’t contract with companies 2 and 3, you’re stuck with companies 1 and 4, which even Defense officials admit is not optimal from a national security perspective. “The only reason we’re still talking to these people [Anthropic] is we need them and we need them now. The problem for these guys is they are that good,” a Defense official told Axios ahead of the meeting.

The latest Clarity Act negotiations between finance and crypto last week inadvertently turned into the latest episode of recurring segment I’m now calling: “Why is Laura Loomer tweeting about obscure deep-cut tech issues as if they are MAGA loyalty tests?”

Last Thursday, a small group of powerful crypto and finance players met at the White House to continue hashing out draft language over stablecoin yields. Coinbase, which sparked these negotiations after it withdrew support from Clarity over stablecoin yields, was in attendance. Prior to the meeting, however, Loomer tweeted a classic banger that demonstrated the tactics she uses to wield influence over Trump: Cast the target as someone who once supported Trump’s enemies and is therefore disloyal.

Screenshot via @LauraLoomer/X.

Ironically, Coinbase has turned into one of the biggest branded boosters of the Trump administration, donating money to his pet initiatives and even having their logo splashed all over last year’s military parade.

Advertisement

Though Loomer tweeted a similar sentiment about Coinbase last June, it seems to have had no impact on whether Coinbase has access to Trump, and likely won’t for a while: I’m told that CEO Brian Armstrong was at Mar-a-Lago the day before Loomer tweeted, attending a World Liberty Financial event.

A wild Trumpworld character has appeared!

If you followed the saga of Logan Paul auctioning off his Pokémon card collection, you may be aware that one of those cards sold for a record-setting $16.5 million last week. But who’s that Pokémon purchaser? It’s AJ Scaramucci, the son of the one and only Anthony Scaramucci, the New York financier and former Trump ally who famously served as Trump’s White House Communications Director in 2017 for 10 days.

AJ is the founder of Solari Capital, which invested $100 million in a Bitcoin mining platform run by Eric Trump. He also now owns the Pikachu Illustrator card, one of only 39 cards in existence and in Grade 10 condition, as well as the diamond chain and carrying case that Paul wore to display the card when he appeared at WrestleMania 38. Scaramucci told reporters that he purchased the card as part of his upcoming “planetary treasure hunt,” adding that he also hoped to purchase a T. rex skull and the Declaration of Independence. (He later posted on X that he hoped to place the card in the Nintendo Museum in Kyoto and cement it as “the ‘Mona Lisa’ of the Pokemon franchise.”)

Screenshot via @jedimooch/X.

Screenshot via @jedimooch/X.

We can’t believe that a court has to tell you this, much less the Southern District of New York: If you put correspondence between you and your lawyer into a publicly available AI platform, it is no longer protected by attorney-client privilege and becomes subject to discovery!!!!

Advertisement

In any case, have a pleasant State of the Union watch party (if anyone does that anymore) and see you next week.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

Apple app password scam email warning

Published

on

Apple app password scam email warning

NEWYou can now listen to Fox News articles!

You open your inbox and see a subject line from Apple. It says an app-specific password was generated for your account. Then your stomach drops.

The email claims you authorized a $2,990.02 PayPal payment. It even includes a confirmation number. It urges you to call a support number right away. There is just one problem. You never did any of this.

If that sounds familiar, you are likely looking at a classic Apple impersonation scam.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Scammers are using Apple branding and urgent language to trick victims into calling a fake support number. (Kevin Carter/Getty Images)

What the fake Apple email says

The message claims:

  • An app-specific password was generated
  • A large PayPal payment was approved
  • You should call the listed phone number to report an unauthorized transaction

At first glance, it looks polished. It uses Apple branding. It mentions Apple Support. It includes a confirmation code. However, once you slow down and read it carefully, the red flags jump out.

Red flags in the Apple app-specific password scam email

Before you panic or pick up the phone, take a closer look at these warning signs that expose this Apple app-specific password scam email.

1) The ‘To’ address is not you

The “To” field shows an email address that is not the recipient’s actual address. That is a huge warning sign. Legitimate Apple security emails are sent directly to the Apple ID email on file. If the visible recipient address is different from yours, the message was likely mass-mailed or spoofed. Scammers blast these emails to thousands of addresses at once. They do not customize the recipient line properly. That mismatch alone is enough to treat the message as fraudulent.

Advertisement

2) The sudden $2,990 charge

Scammers love big numbers. A charge close to $3,000 is designed to trigger panic. When people feel fear, they act fast. That is exactly what the criminals want.

3) The ‘call this number now’ trick

The email pushes you to call a specific phone number. That number does not belong to Apple. Real Apple security emails tell you to visit your account directly. They do not pressure you to call a random support line.

If you call, the scammer may:

  • Ask for your Apple ID password
  • Request remote access to your computer
  • Tell you to move money to “secure” your account

That is how the real damage begins.

4) Bold links that push you to click

The email includes bold links such as Apple Account and Apple Support. They are designed to look official and trustworthy. However, scammers often hide malicious URLs behind legitimate-looking text. When you hover over the link, the actual destination may be a completely different website. That is why you should never click links inside a suspicious email. Instead, open a new browser window and type the official website address yourself.

5) Mixed messages about passwords and payments

The subject mentions an app-specific password. The body suddenly talks about a PayPal transaction. That mismatch is a major warning sign. Scammers often combine multiple fears into one message to increase urgency.

Advertisement

6) Generic greeting

The email opens with “Dear Customer.” Apple typically addresses you by your name. Generic greetings are common in bulk phishing emails.

SPYWARE CAN HIGHJACK YOUR PHONE IN SECONDS

A fake Apple email claiming a $2,990 PayPal charge is targeting inboxes in a new impersonation scam. (Qilai Shen/Bloomberg via Getty Images)

More subtle signs this is a scam

There are several additional details that help confirm this is not real.

The reply-to address may look legitimate at first glance

In this case, the Reply-To field shows appleid-usen@email.apple.com, which appears to be an official Apple domain. However, a familiar-looking domain does not automatically prove an email is legitimate. Scammers can spoof visible sender information. They can manipulate display names and certain header fields so a message appears to come from a trusted company. Most people never see the deeper technical authentication details, such as SPF, DKIM or DMARC validation. That means a legitimate-looking sender address can still appear in a fraudulent message. When evaluating a suspicious Apple app-specific password email, weigh all the red flags together, not just the reply-to address.

Advertisement

If the email also includes:

  • A mismatched “To” field
  • A large unexpected payment
  • An urgent phone number
  • Mixed messaging about passwords and PayPal

Those warning signs matter far more than a familiar-looking domain.

The payment language feels forced

The email says: “You authorized a USD 2,990.02 payment to apple.com using PayPal.” That wording feels stiff and unnatural. Apple receipts usually reference specific products, subscriptions or invoice details. They do not vaguely reference a large PayPal payment tied to a password notification. The mismatch between a password alert and a major payment should raise suspicion immediately.

The masked email formatting looks odd

The message shows a masked address with dots and an unusual domain, such as relay.quickinvoicesus.com. That is not standard Apple formatting. Apple typically references your Apple ID directly, not an unrelated invoice-style domain. That strange domain inclusion is another strong indicator that this email is fraudulent.

The pressure to act fast

The message urges you to call immediately to report an unauthorized transaction. High urgency is a hallmark of phishing. Legitimate companies encourage you to log in securely to your account. They do not rush you into calling a third-party phone number. When you feel rushed, pause. Scammers rely on speed and emotion.

What this scam is really trying to do

This is a refund scam disguised as a security alert.

Advertisement

The goal is simple. Get you to call the fake support number. Once you are on the phone, the scammer may:

  • Ask for your Apple ID password
  • Request remote access to your computer
  • Guide you through fake refund steps
  • Steal banking or PayPal information

In many cases, victims lose far more than the fake $2,990 charge mentioned in the email.

How to check your Apple account safely

If you receive this type of message, pause. Then take control. Instead of clicking links in the email:

  • Open a new browser window
  • Type appleid.apple.com directly into the address bar
  • Log in and review your account activity

If you did not generate an app-specific password and you see no suspicious charges, you are safe. You can also check your PayPal account directly by typing paypal.com into your browser. Never rely on links or phone numbers inside a suspicious email.

Apple app-specific password scam email checklist

Use this simple checklist the next time you get a scary email:

  • The “To” field does not match your email
  • The greeting says Dear Customer
  • There is a large unexpected charge
  • You are told to call a number immediately
  • The topic feels mismatched, such as password plus payment

If several of these appear together, you are almost certainly dealing with a scam.

Why Apple and PayPal impersonation scams keep working

Apple has billions of users. PayPal has hundreds of millions more. Both brands are trusted, widely used and connected to sensitive financial information. When criminals attach Apple’s name to a message, people pay attention. When they add PayPal and a large dollar amount, the fear intensifies. That combination is powerful. It blends account security concerns with financial panic. Many people react before they pause to verify the details. That split second of fear is exactly where scammers make their money.

“PayPal does not tolerate fraudulent activity, and we work hard to protect our customers from evolving phishing scams,” a PayPal spokesperson told CyberGuy. “We always encourage consumers to practice vigilance online and to learn how to spot the warning signs of common fraud. We recommend reviewing our best practice tips for avoiding phishing schemes on the PayPal Newsroom, and contacting Customer Support directly through the PayPal app or our Contact page for assistance if you believe you have been targeted by a scam.”

Advertisement

CyberGuy also reached out to Apple for comment.

TAX SEASON SCAMS 2026: FAKE IRS MESSAGES STEALING IDENTITIES

The fraudulent message combines an app-specific password alert with a PayPal charge to create panic. (Christian Charisius/picture alliance via Getty Images)

How to protect yourself from Apple phishing emails

You can reduce your risk from an Apple app-specific password scam email with a few smart habits. These steps protect more than just your Apple account. They protect your entire digital life.

1) Use two-factor authentication

Enable two-factor authentication (2FA) on your Apple ID, PayPal and email accounts. Even if someone guesses your password, they still cannot log in without the second verification step. That extra layer blocks most account takeover attempts.

Advertisement

2) Never click links or call numbers in suspicious emails

If an email tells you to call support or click a link, stop. Instead, open a new browser window and type the official website address yourself. Go directly to appleid.apple.com or paypal.com. Also, make sure you have strong antivirus software installed on your devices. Strong antivirus tools can detect malicious links, block phishing sites and warn you before you land on a fake login page. That protection matters because one click on the wrong link can expose login credentials or install hidden malware. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

3) Watch for urgency and fear tactics

Scammers push urgency. They use large dollar amounts and phrases like unauthorized transaction to rush you. Pause when you feel panic. Review the details carefully. Legitimate companies do not pressure you into instant action.

4) Keep your devices updated

Install software updates on your phone and computer as soon as they become available. Security patches fix vulnerabilities that attackers exploit. Outdated software makes phishing and malware attacks easier to pull off.

5) Use a password manager and strong, unique passwords

Do not reuse passwords across accounts. If one site gets breached, reused passwords put everything else at risk. A password manager generates long, complex passwords and stores them securely. That way, even if scammers trick you into entering one password somewhere, it will not unlock your other accounts. 

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

6) Reduce your exposed personal information

Scammers often find your email address and personal details through data broker sites. Using a reputable data removal service can reduce how much of your personal information is publicly available online. When less of your data floats around the internet, criminals have fewer tools to target you with convincing phishing emails. Less exposure means fewer personalized scams landing in your inbox. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

7) Report the phishing email

Forward suspicious Apple impersonation emails to reportphishing@apple.com. You can also mark the message as phishing in your email provider. Reporting scams helps improve filters and protect other people from falling victim.

8) Monitor your financial accounts

Even if you did not click anything or call the number, review your bank, PayPal and Apple accounts for unusual activity over the next few days. Early detection limits damage. The faster you spot fraud, the easier it is to reverse.

9) Consider freezing your credit if information was exposed

If you entered personal information or downloaded anything suspicious, consider placing a free credit freeze with Equifax, Experian and TransUnion. A credit freeze prevents criminals from opening new accounts in your name. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

Advertisement

Kurt’s key takeaways

If you received an Apple app-specific password email with a $2,990 charge you did not authorize, trust your instincts. It is almost certainly a scam. Do not call the number. Do not click the links. Go directly to your official account pages and check for yourself. A few calm minutes can save you thousands of dollars and hours of stress.

When phishing scams use trusted brands like Apple so easily, is the tech industry truly staying ahead of cybercriminals? Let us know your thoughts by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement

Related Article

Don't ignore Apple's urgent security update
Continue Reading

Technology

How Claude Code Claude Codes

Published

on

How Claude Code Claude Codes

Claude Code is a developer tool for developers. And yet, over the last year and especially the last few months, the team at Anthropic has seen a huge number of people, across industries and disciplines, figure out how to access their terminal so that they could build new stuff too. Few AI products have found true product-market fit the way Claude Code has. But how did that happen? And are we ever going to get out of the terminal?

On this episode of The Vergecast, Anthropic’s Boris Cherny, the head of Claude Code, explains how the project has taken off over the last year. Cherny has made a lot of headlines recently by saying that Claude Code now writes 100 percent of his code, and he explains how his relationship to that code has changed. We also talk about Cowork, and Anthropic’s ongoing attempt to make Claude Code (and everything) a little more accessible to everyday users. It won’t just be chat windows, but nobody’s exactly sure what it will be yet.

After that, The Verge’s Hayden Field joins the show to continue our conversation from a few weeks ago about AI and privacy. These new agentic systems all ask for vast access to our data, our apps, even our devices themselves, in exchange for doing lots of useful things on our behalf. Hayden walks through the tradeoffs inherent in that access and how you should think about guarding your data going forward.

Finally, The Verge’s Allison Johnson helps David answer a question from the Vergecast Hotline (call 866-VERGE11 or email vergecast@theverge.com!) about how the RAM shortage will affect your gadget purchases this year. Depending on who you are, and how old your gadgets are, it’s either time to do some maintenance or do some upgrading.

If you want to know more about everything we discuss in this episode, here are some links to get you started:

Advertisement
Continue Reading
Advertisement

Trending