Connect with us

Technology

How to send free digital invitations on iPhone

Published

on

How to send free digital invitations on iPhone

NEWYou can now listen to Fox News articles!

Creating invitations should feel easy, not stressful. Apple’s Invites app makes it simple to create free digital invitations with built-in RSVP tools, even if your guests do not use iPhones.

You can design the invite, track responses, and share photos after the event, all from your iPhone. Below is a clear step-by-step guide with exact instructions so you can get it right the first time.

Oh, and if you want more options beyond Apple’s Invites app, we also cover the best invitation apps for both iPhone and Android.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

HOW TO SHARE YOUR ESTIMATED ARRIVAL TIME ON IPHONE AND ANDROID

Apple’s Invites app lets users create free digital invitations with built-in RSVP tools directly from an iPhone, making event planning faster and easier. (Katharina Kausche/picture alliance via Getty Images)

Why Apple Invites makes event planning easier

Apple Invites keeps everything in one place. You design the invite, manage RSVPs and share memories without switching apps. You can:

  • Create invitations for parties, meetings and family events
  • Let guests RSVP from any device
  • Share photos, playlists and links after the event

Apple Invites system requirements

Before you start, confirm these basics. You need:

  • An iPhone running iOS 18 or newer
  • An iCloud+ subscription to create invitations

Guests can view and RSVP without an iCloud+ subscription. The steps in this article were tested on an iPhone 15 Pro Max running iOS 26.2.

Download Apple Invites from the App Store

First, install the Apple Invites app.

  • Open the App Store.
  • Search for Apple Invites.
  • Download the app named Apple Invites to avoid confusion.

Open the Invites app after installation.

How to create a free digital invitation with RSVP on iPhone

You are now ready to build your invitation.

Advertisement

Start a new invitation in Apple Invites

  • Open the Invites app.
  • If this is your first time, tap Create Invitation.

If you have created invites before, tap the plus icon in the top corner.

Add a background image to your invitation

  • Tap Add Background.
  • Choose one option:PhotosCameraPlayground using Apple Intelligence on supported modelsYou can also select Emoji, Photographic or Color backgrounds.
  • Photos
  • Camera
  • Playground using Apple Intelligence on supported models
  • You can also select Emoji, Photographic or Color backgrounds.

Grant photo or camera access if prompted.

Add event details like title, date and location

Next, fill in the key information.

  • Tap Event Title and enter the name of your event.Choose from four available fonts.
  • Choose from four available fonts.
  • Tap Date and Time.Select a start and end time or mark the event as all day.
  • Select a start and end time or mark the event as all day.
  • Tap Location.Enable Location Services if prompted.
  • Enable Location Services if prompted.
  • Tap Add a Description to include event details or notes.

If you add both a date and a location, the app automatically shows:

  • The weather forecast for that day
  • A Maps link with directions

Add optional features like photos, links and playlists

You can add several optional features to enhance your invitation.

  • Add a shared photo album so guests can view and upload photos by tapping Create Album
  • Add a website link, such as a gift registry, by tapping Add a Link
  • Add a shared Apple Music playlist guests can listen to and add songs to by tapping Add Playlist

Add a Tile to bundle photos, playlists or links in one place by tapping Add Tile

Preview and create your invitation

Before sending, review everything.

  • Tap Preview.
  • Review how the invitation will look to guests.
  • Tap Next in the upper-right corner.
  • Wait a few seconds while the invite is created.

NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS

Apple Invites allows hosts to design invites, track guest responses and share photos without requiring guests to own an iPhone. (Nikolas Kokovlis/NurPhoto via Getty Images)

How to send invitations and manage RSVPs on iPhone

Once your invitation is live, you can share it in two different ways.

Invite guests using a public link

  • Under Invite with Public Link, choose how you want to share the link:MessagesMailShare LinkCopy Link
  • Messages
  • Mail
  • Share Link
  • Copy Link
  • Toggle Approve Guests on if you want to review RSVPs before guests are added.
  • Leave Approve Guests off to allow anyone with the link to RSVP automatically.

Guests who accept the invite will appear in your guest list.

Invite guests individually

  • Scroll to Invite Individuals.
  • Tap Choose a Guest.
  • Then you’ll be prompted to access your contacts and click Continue.
  • Click Select Contacts
  • Select only the contacts you want to include for this invitation and click Continue 
  • Tap Allow Selected Contacts 
  • Select a contact to send a one-time invite link.
  • Then click Messages, Mail or Share Link

This option sends a unique link to a single guest.

Guests can RSVP even if they do not own an iPhone.

Advertisement

How to send invitations and manage RSVPs on iPhone

Once your invitation is live, you can share it in two different ways.

Invite guests using a public link

  • Under Invite with Public Link, choose how you want to share the link:MessagesMailShare LinkCopy Link
  • Messages
  • Mail
  • Share Link
  • Copy Link
  • Toggle Approve Guests on if you want to review RSVPs before guests are added.
  • Leave Approve Guests off to allow anyone with the link to RSVP automatically.

Guests who accept the invite will appear in your guest list.

Invite guests individually

  • Scroll to Invite Individuals.
  • Tap Choose a Guest.
  • Then you’ll be prompted to access your contacts and click Continue.
  • Click Select Contacts
  • Select only the contacts you want to include for this invitation and click Continue 
  • Tap Allow Selected Contacts 
  • Select a contact to send a one-time invite link.
  • Then click Messages, Mail or Share Link

This option sends a unique link to a single guest.

Guests can RSVP even if they do not own an iPhone.

Manage event settings and RSVP notifications

You stay in control after sending.

  • Tap the Settings icon inside the invite.
  • Adjust guest permissions and RSVP options.
  • Enable notifications to receive alerts when guests respond.
  • Set plus one limits or block additional guests if needed.

Your invitation appears on the app home screen under Upcoming.

Edit an invite after sending it

Plans change, and edits are allowed.

  • Open the invite from the Upcoming list.
  • Tap the More Button (three horizontal dots in the upper-right corner)
  • Click Edit to update details.
  • Changes sync automatically for guests.

5 BEST APPS TO USE ON CHATGPT RIGHT NOW

With Apple Invites, users can manage event details, RSVPs and shared content all in one place using iOS 18 or newer. (Nikolas Kokovlis/NurPhoto via Getty Images)

Advertisement

Pro tip: duplicate invitations for recurring events

If you host a recurring event, such as a book club, save time.

  • Open an existing invitation.
  • Tap the More button. (three horizontal dots in the upper-right corner)
  • Select Duplicate.
  • Adjust the date, time or details as needed.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Apple Invites makes event planning feel simple again. You can create free digital invitations, send them in seconds and track RSVPs without chasing people down. Everything lives in one place, from guest lists to shared photos, which saves time and reduces stress. Best of all, guests do not need an iPhone to respond. That makes Apple Invites practical for real life, not just Apple users. Whether you are planning a birthday, a family dinner, or a casual meetup, this app helps you focus on the event rather than the logistics.

Would you consider replacing paper invites or group texts with Apple Invites, or are you still planning events the old way? Let us know by writing to us at Cyberguy.com.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Fired Rockstar employees’ plea for interim pay denied

Published

on

Fired Rockstar employees’ plea for interim pay denied

A UK employment tribunal rejected a request from fired Rockstar Games employees to receive interim pay while waiting for a full hearing about their dismissal, according to Bloomberg and IGN. After Rockstar fired 34 employees last year — 31 from the UK and three from Canada — the Independent Workers’ Union of Great Britain (IWGB) accused the company of “union busting.” Rockstar claims that the fired employees were leaking company information in a Discord channel.

The hearing took place over two days last week. “Despite being refused interim relief today, we’ve come out of last week’s hearing more confident than ever that a full and substantive tribunal will find Rockstar’s calculated attempt to crush a union to be not only unjust but unlawful,” IWGB president Alex Marshall says in a statement. “The fact that we were granted this hearing speaks to the strength of our case and, over the course of the two-day hearing, Rockstar consistently failed to back up claims made in the press or to refute that they acted unfairly, maliciously, and in breach of their own procedures.”

“We regret that we were put in a position where dismissals were necessary, but we stand by our course of action as supported by the outcome of this hearing,” a Rockstar Games spokesperson says in statements to Bloomberg and IGN. Rockstar and owner Take-Two didn’t immediately reply to a request for comment.

Rockstar is working on Grand Theft Auto VI, which was recently delayed from a planned May launch to November 19th.

Continue Reading

Technology

Why your Android TV box may secretly be a part of a botnet

Published

on

Why your Android TV box may secretly be a part of a botnet

NEWYou can now listen to Fox News articles!

Android TV streaming boxes that promise “everything for one price” are everywhere right now. 

You’ll see them on big retail sites, in influencer videos, and even recommended by friends who swear they’ve cut the cord for good. And to be fair, they look irresistible on paper, offering thousands of channels for a one-time payment. But security researchers are warning that some of these boxes may come with a hidden cost.

In several cases, devices sold as simple media streamers appear to quietly turn your home internet connection into part of larger networks used for shady online activity. And many buyers have no idea it’s happening.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

Android TV streaming boxes promising unlimited channels for a one-time fee may quietly turn home internet connections into proxy networks, according to security researchers. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)

What’s inside these streaming boxes

According to an investigation by Krebs on Security, media streaming devices don’t behave like ordinary media streamers once they’re connected to your network. Researchers closely examine SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox markets itself as just hardware. The company claims it doesn’t pre-install pirated apps and insists users are responsible for what they install. That sounds reassuring until you look at how the device actually works.

To unlock the thousands of channels SuperBox advertises, you must first remove Google’s official app ecosystem and replace it with an unofficial app store. That step alone should raise eyebrows. Once those custom apps are installed, the device doesn’t just stream video but also begins routing internet traffic through third-party proxy networks.

What this means is that your home internet connection may be used to relay traffic for other people. That traffic can include ad fraud, credential stuffing attempts and large-scale web scraping.

Advertisement

During testing by Censys, a cyber intelligence company that tracks internet-connected devices, SuperBox models immediately contacted servers tied to Tencent’s QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.

Grass describes itself as an opt-in network that lets you earn rewards by sharing unused internet bandwidth. This suggests that SuperBox devices may be using SDKs or tooling that hijack bandwidth without clear user consent, effectively turning the box into a node inside a proxy network.

Why SuperBox activity resembles botnet behavior

In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without the owners realizing it.

Researchers discovered SuperBox devices contained advanced networking and remote access tools that have no business being on a streaming box. These included utilities like Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.

The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled “secondstage,” suggesting additional payloads or functionality beyond streaming.

Advertisement

SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but often come preloaded with malware or require unofficial app stores that expose users to serious risk.

In July 2025, Google filed a lawsuit against operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for advertising fraud and proxy services, and many were infected before consumers even bought them.

Around the same time, the Feds warned that compromised streaming and IoT devices were being used to gain unauthorized access to home networks and funnel traffic into criminal proxy services.

We reached out to SuperBox for comment but did not receive a response before our deadline.

8 steps you can take to protect yourself

If you already own one of these streaming boxes or are thinking about buying one, these steps can help reduce your risk significantly.

Advertisement

1) Avoid devices that require unofficial app stores

If a streaming box asks you to remove Google Play or install apps from an unknown marketplace, stop right there. This bypasses Android’s built-in security checks and opens the door to malicious software. Legitimate Android TV devices don’t require this.

2) Use strong antivirus software on your devices

Even if the box itself is compromised, strong antivirus software on your computers and phones can detect suspicious network behavior, malicious connections or follow-on attacks like credential stuffing. Strong antivirus software monitors behavior, not just files, which matters when malware operates quietly in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

3) Put streaming devices on a separate or guest network

If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones or work systems. It’s one of the simplest ways to limit damage if something goes wrong.

4) Use a password manager

If your internet connection is being abused, stolen credentials often come next. A password manager ensures every account uses a unique password, so one leak doesn’t unlock everything. Many password managers also refuse to autofill on suspicious or fake websites, which can alert you before you make a mistake.

Advertisement

MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

Investigators warn some Android-based streaming boxes route user bandwidth through third-party servers linked to ad fraud and cybercrime. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

5) Consider using a VPN for sensitive activity

A VPN won’t magically fix a compromised device, but it can reduce exposure by encrypting your traffic when browsing, banking or working online. This makes it harder for third parties to inspect or misuse your data if your network is being relayed.

Advertisement

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

6) Watch your internet usage and router activity

Unexpected spikes in bandwidth, slower speeds or strange outbound connections can be warning signs. Many routers show connected devices and traffic patterns.

If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.

Also, make sure your router firmware is up to date and that you’ve changed the default admin password. Compromised devices often try to exploit weak router settings to persist on a network.

7) Be wary of “free everything” streaming promises

Unlimited premium channels for a one-time fee usually mean you’re paying in some other way, often with your data, bandwidth or legal exposure. If a deal sounds too good to be true, it usually is.

Advertisement

8) Consider a data removal service

If your internet connection or accounts have been abused, your personal details may already be circulating among data brokers. A data removal service can help opt you out of people-search sites and reduce the amount of personal information criminals can exploit for follow-up scams or identity theft. While it won’t fix a compromised device, it can limit long-term exposure.

10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

Cyber experts say certain low-cost streaming devices behave more like botnet nodes than legitimate media players once connected to home networks. (Photo by Alessandro Di Ciommo/NurPhoto via Getty Images)

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Advertisement

Kurt’s key takeaway

Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it’s worth asking what it’s really doing behind the scenes. Research shows that some of these boxes don’t just stream TV. They quietly turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn’t mean giving up control of your internet connection. Before plugging in that “too good to be true” box, it’s worth slowing down and looking a little closer.

Would you still use a streaming box if it meant sharing your internet with strangers? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Technology

Anthropic wants you to use Claude to ‘Cowork’ in latest AI agent push

Published

on

Anthropic wants you to use Claude to ‘Cowork’ in latest AI agent push

Anthropic wants to expand Claude’s AI agent capabilities and take advantage of the growing hype around Claude Code — and it’s doing it with a brand-new feature released Monday, dubbed “Claude Cowork.”

“Cowork can take on many of the same tasks that Claude Code can handle, but in a more approachable form for non-coding tasks,” Anthropic wrote in a blog post. The company is releasing it as a “research preview” so the team can learn more about how people use it and continue building accordingly. So far, Cowork is only available via Claude’s macOS app, and only for subscribers of Anthropic’s power-user tier, Claude Max, which costs $100 to $200 per month depending on usage.

Here’s how Claude Cowork works: A user gives Claude access to a folder on their computer, allowing the chatbot to read, edit, or create files. (Examples Anthropic gave included the ability fo “re-organize your downloads by sorting and renaming each file, create a new spreadsheet with a list of expenses from a pile of screenshots, or produce a first draft of a report from your scattered notes.”) Claude will provide regular updates on what it’s working on, and users can also use existing connectors to link it to external info (like Asana, Notion, PayPal, and other supported partners) or link it to Claude in Chrome for browser-related tasks.

“You don’t need to keep manually providing context or converting Claude’s outputs into the right format,” Anthropic wrote. “Nor do you have to wait for Claude to finish before offering further ideas or feedback: you can queue up tasks and let Claude work through them in parallel. It feels much less like a back-and-forth and much more like leaving messages for a coworker.”

The new feature is part of Anthropic’s (and its competitors’) bid to provide the most actually useful AI agents, both for consumers and enterprise. AI agents have come a long way from their humble beginnings as mostly-theoretically-useful tools, but there’s still much more development needed before you’ll see your non-tech-industry friends using them to complete everyday tasks.

Advertisement

Anthropic’s “Skills for Claude,” announced in October, was a partial precursor to Cowork. Starting in October, Claude could improve at personalized tasks and jobs, by way of “folders that include instructions, scripts, and resources that Claude can load when needed to make it smarter at specific work tasks — from working with Excel [to] following your organization’s brand guidelines,” per a release at the time. People could also build their own Skills for Claude relative to their specific jobs and tasks they needed to be completed.

As part of the announcement, Anthropic warned about the potential dangers of using Cowork and other AI agent tools, namely the fact that if instructions aren’t clear, Claude does have the ability to delete local files and take other “potentially destructive actions” — and that with prompt injection attacks, there are a range of potential safety concerns. Prompt injection attacks often involve bad actors hiding malicious text in a website that the model is referencing, which instructs the model to bypass its safeguards and do something harmful, such as hand over personal data. “Agent safety — that is, the task of securing Claude’s real-world actions — is still an active area of development in the industry,” Anthropic wrote.

Claude Max subscribers try out the new feature by clicking on “Cowork” in the sidebar of the macOS app. Other users can join the waitlist.

Continue Reading
Advertisement

Trending