Tag: iMessage

  • A strange iMessage problem Apple needs to solve

    A strange iMessage problem Apple needs to solve

    For the last couple of years, I’ve noticed something odd with Apple’s Messages app, especially when it comes to pictures. I keep hoping Apple will fix it, but so far, they haven’t done anything about it. Here’s the issue: if you send an AVIF picture through iMessage, it doesn’t show up right. AVIF is a type of image that’s getting more popular, so this glitch is kind of frustrating.

    But that’s not the whole story. It’d be fine if Apple just didn’t work with AVIF files at all. Instead, for some strange reason, the image pops up in a tiny box on your screen. There’s no way to make it bigger, so you’re stuck squinting at a super small picture you can’t see.

    This happens on both iPhones and Macs. The funny thing is, before you send the AVIF picture, it looks perfectly fine in the preview. You’d never guess there’d be a problem until after you hit send. It’s not like Apple doesn’t know how to handle AVIF. They added support for it in Safari with iOS 16, which was over two years ago. So, they’re halfway there—they just haven’t updated iMessage to keep up. The files show up, but you can’t view them properly.

    This whole thing feels off. Since AVIF works in Safari and the Photos app, people naturally send these images through iMessage. But when they don’t display correctly, it’s a letdown. You’re left with a useless picture.

    I hope Apple tackles this soon. It’s a small but annoying issue that messes up the experience. With AVIF becoming more common, it’s time for iMessage to catch up and let us see those images the way they’re meant to be seen.

  • How phishing scammers are exploiting a quirky iMessage feature

    How phishing scammers are exploiting a quirky iMessage feature

    The digital world, for all its convenience, is a battlefield. Lurking in the shadows are cybercriminals constantly devising new ways to pilfer personal information. A recent trend has emerged, targeting iPhone users with a clever social engineering tactic that exploits a little-known iMessage behavior. This isn’t a sophisticated technical hack, but rather a manipulation of human behavior, making it all the more insidious. 

    The core of the issue lies in how iMessage handles links from unknown senders. For security reasons, iMessage automatically disables hyperlinks in messages from numbers not saved in your contacts. This is a crucial defense against phishing attempts, preventing accidental clicks on malicious websites. However, a loophole exists: if the recipient replies to the message or adds the sender to their contacts, those previously inactive links suddenly become live. And this is precisely what scammers are now exploiting.

    Imagine receiving a text message seemingly from a reputable organization, perhaps a delivery service like FedEx or a local toll authority. The message might claim a missed delivery or an outstanding balance, prompting immediate action. Crucially, the message includes a link, but initially, it’s not clickable. The message might also include a seemingly innocuous instruction, such as “Reply STOP to unsubscribe” or “Reply NO to decline.” This is the hook.

    The scammers are banking on the user’s natural inclination to respond, especially if the message creates a sense of urgency or concern. By replying, even with a simple “STOP” or “NO,” the user inadvertently activates the embedded link. This seemingly harmless action opens the door for the scammers to direct the victim to a fraudulent website designed to steal personal data, such as login credentials, credit card numbers, or other sensitive information.

    This tactic preys on the familiarity of legitimate business practices. Many companies use automated text messages for notifications, often including instructions to reply with specific keywords. Scammers are mimicking this practice, creating a sense of legitimacy and trust. The surge in SMS phishing (smishing) attacks asking recipients to reply with “Y” to “activate” supposedly legitimate links further blurs the lines. 

    The implications are significant. While tech-savvy users might quickly recognize these attempts for what they are, less experienced users, particularly older individuals, are significantly more vulnerable. They may not be aware of this specific iMessage behavior and are more likely to fall for the social engineering trick.

    So, how can you protect yourself? The most effective defense is simple: never reply to suspicious messages from unknown senders. If you receive a message from an unfamiliar number containing a link, regardless of how urgent or official it appears, resist the urge to respond. If you are genuinely concerned about a potential issue with a delivery or account, contact the organization directly through their official website or phone number, not through the information provided in the suspicious message.

    Beyond this crucial advice, iPhone and iPad users can also utilize message filtering. This feature sorts messages from non-contacts into a separate list within the Messages app, providing a clearer view of potential spam. To enable this, go to Settings > Messages and toggle on “Filter Unknown Senders.” This won’t block the messages entirely, but it will help you manage them more effectively.

    It’s important to remember that message filtering isn’t foolproof. Legitimate messages from delivery services, banks, or other essential services might occasionally end up in the filtered list. Therefore, it’s crucial to exercise caution and not automatically dismiss a filtered message as malicious. However, as previously stated, you cannot click links in messages from unknown senders until you either add them to your contacts or reply to their message, and this is a deliberate security measure.

    In the ever-evolving landscape of cyber threats, vigilance is key. By understanding how these scams operate and adopting simple precautionary measures, you can significantly reduce your risk of falling victim to these subtle yet effective phishing attacks. The key takeaway is to be skeptical, avoid reacting impulsively to messages from unknown sources, and always verify information through official channels.