News
Apple cancels plan for Mac-connected AR Glasses

Apple has reportedly canceled a project aimed at developing affordable augmented reality (AR) glasses that would connect to a Mac. These glasses, known internally as N107, were designed to resemble regular eyewear but with built-in displays, requiring a constant connection to a Mac for processing power and battery life.
The N107 project was intended to offer a less expensive alternative to the Apple Vision Pro, which is priced at nearly $3,500. The glasses featured projectors to display content directly in the user’s line of sight, enabling work in an augmented digital environment. This feature is already present in the Apple Vision Pro, particularly through ultra-wide Mac display mirroring, which is considered a significant advantage of the device.
Initially, developers hoped the N107 glasses could pair with an iPhone. However, the high processing demands led to rapid battery depletion in iPhones. Switching the connection to a Mac provided better performance and battery support, but this solution did not meet executive expectations during evaluations.
Members of the Apple Vision Products Group expressed concerns about the project’s unclear direction, fearing it lacked focus. These concerns were validated when Apple decided to terminate the project in late January. Meanwhile, Meta Platforms continues to develop its AR Ray-Ban smart glasses, aiming for a 2027 release. Apple is reportedly still working on a direct successor to the Apple Vision Pro.
This cancellation follows other recent project terminations at Apple. In February 2024, the company ended its secretive Apple Car initiative, known as Project Titan, which employees had dubbed a “Titanic disaster.” Additionally, Apple reportedly scrapped plans for a separate iPhone hardware subscription service, possibly because the existing iPhone Upgrade Program already fulfilled that role.
How some countries are misusing Google’s AI Tool, Gemini

Google’s AI tool, Gemini, is designed with safety measures to prevent misuse. However, government-backed groups from countries like China, Iran, North Korea, and Russia have attempted to exploit it for harmful purposes. These groups, known as Advanced Persistent Threats (APTs), have used Gemini to gather information on military and intelligence targets, understand software weaknesses, and assist in coding tasks.
Additionally, Information Operations (IO) groups from these nations have utilized Gemini for translation, refining the tone of their messages, and disguising their true identities to operate secretly.
Despite these attempts, Google reports that most efforts to misuse Gemini have been unsuccessful. Many have tried to bypass Gemini’s safety protocols using known methods, but these attempts have largely failed.
This situation highlights the challenges in preventing AI misuse. While Google has been effective in stopping direct harmful actions through Gemini, malicious actors can still use the AI’s capabilities to support their activities in less obvious ways. This underscores the need for ongoing vigilance and improvement in AI safety measures.
For a more detailed understanding, you can read Google’s full Threat Intelligence Group report.
Google adds extra security step to Android log-in prompts

Google has enhanced the security of its log-in prompts on Android devices. Previously, when signing into your Google Account, you would receive a prompt asking, “Are you trying to sign in?” and could confirm by tapping “Yes, it’s me.”
Now, with version 25.02.34 of Google Play Services, an additional verification step is required. After confirming, you’ll be prompted to authenticate using your fingerprint, PIN, face recognition, or another two-factor authentication (2FA) method. This change aims to provide an extra layer of protection for your account.
While the added step may slightly increase the time it takes to log in, the enhanced security is a valuable trade-off. iOS users will experience a similar update, with the Google app or Gmail handling the prompt instead of Play Services.
News
Samsung releases January 2025 security update for Galaxy devices

Samsung has begun distributing its first monthly update of 2025, featuring the January 2025 security patch, to a variety of Galaxy devices. This update primarily enhances security, addressing nearly 30 vulnerabilities, including five critical issues identified in Google’s January 2025 security bulletin, along with 22 Samsung-specific fixes.
Currently, the update is being rolled out to the following Galaxy models in select regions:
- Galaxy S24 Series: S24, S24+, S24 Ultra
- Galaxy S23 Series: S23, S23+, S23 Ultra
- Galaxy S22 Series: S22, S22+, S22 Ultra
- Galaxy S21 Series: S21, S21+, S21 Ultra
- Galaxy S20 Series: S20, S20+, S20 Ultra
- Galaxy S21 FE
- Galaxy S20 FE
- Galaxy Z Flip Series: Z Flip 6, Z Flip 5, Z Flip 4, Z Flip 3
- Galaxy Z Fold Series: Z Fold 6, Z Fold SE, Z Fold 5, Z Fold 4, Z Fold 3
- Galaxy A Series: A16, A15, A14, A54, A53, A32
- Galaxy Note 20 Series: Note 20, Note 20 Ultra
The availability of this update may vary depending on your region, carrier, and device model. Samsung plans to extend the rollout to more devices in the coming weeks.
It’s important to note that the One UI 7 update is currently in beta for the Galaxy S24 series and is expected to be released more broadly in February 2025. The stable version of One UI 7 debuted with the Galaxy S25 series, which is now available.
For detailed information on the January 2025 security update and its availability for specific devices, you can refer to Samsung’s official security bulletin. As always, it’s advisable to keep your device updated to ensure optimal security and performance.