
Apple unveils major accessibility updates across its platforms
Apple has announced a range of new accessibility features set to be released later in the year across its platforms.
The new features include Accessibility Nutrition Labels for the App Store, a Magnifier app for Mac, Braille Access on multiple Apple devices and an Accessibility Reader to enhance usability for those with disabilities including dyslexia and low vision.
Widespread updates are also planned for Live Listen, Background Sounds, Personal Voice, Vehicle Motion Cues and more across the Apple ecosystem.
Tim Cook, Chief Executive Officer at Apple, said, "At Apple, accessibility is part of our DNA. Making technology for everyone is a priority for all of us, and we're proud of the innovations we're sharing this year."
"That includes tools to help people access crucial information, explore the world around them and do what they love."
Sarah Herrlinger, Senior Director of Global Accessibility Policy and Initiatives at Apple, added, "Building on 40 years of accessibility innovation at Apple, we are dedicated to pushing forward with new accessibility features for all of our products. Powered by the Apple ecosystem, these features work seamlessly together to bring users new ways to engage with the things they care about most."
Accessibility Nutrition Labels will appear on App Store product pages worldwide, giving users details on accessibility features within apps and games before download.
These sections will cover VoiceOver, Voice Control, Larger Text, Sufficient Contrast, Reduced Motion, captions and other features. Developers will receive guidelines about displaying relevant accessibility information on their app listings.
Eric Bridges, President and Chief Executive Officer of the American Foundation for the Blind, commented, "Accessibility Nutrition Labels are a huge step forward for accessibility. Consumers deserve to know if a product or service will be accessible to them from the very start, and Apple has a long-standing history of delivering tools and technologies that allow developers to build experiences for everyone."
"These labels will give people with disabilities a new way to easily make more informed decisions and make purchases with a new level of confidence."
The Magnifier app, previously available on iPhone and iPad, is coming to Mac. It connects to the user's camera so they can zoom in on surroundings, such as a screen or whiteboard, and allows multitasking with several live session windows. The Magnifier supports Continuity Camera and works with both USB and iPhone cameras.
Users can adjust visual settings, capture and save multiple views, and integrate with Accessibility Reader, which converts physical text into a customisable, legible format.
Braille Access will turn iPhone, iPad, Mac and Apple Vision Pro into full-featured braille note-taking devices.
The tool integrates with the Apple ecosystem and supports app launching using Braille Screen Input or compatible devices. Users can take notes, perform calculations with Nemeth Braille, and open Braille Ready Format files. Live Captions functionality will allow real-time transcription for braille displays.
Accessibility Reader will offer a systemwide reading mode, making text adjustable on iPhone, iPad, Mac and Apple Vision Pro.
It gives users control over font, colour, spacing and offers support for spoken content. Accessibility Reader can be launched from any app and is built into Magnifier for enhanced reading of physical and digital text.
Live Listen updates will include Apple Watch support, allowing users who are deaf or hard of hearing to view Live Captions on their watch while an audio session is underway.
The Watch will also serve as a remote control for Live Listen sessions with support for AirPods and other Made for iPhone hearing aids, as well as integration with existing hearing health features such as the Hearing Aid function on AirPods Pro 2.
Other updates include improved personalisation of Background Sounds with new EQ settings and automation, a faster implementation of Personal Voice enabling users to create their synthetic voice using just 10 recorded phrases in under a minute, and expanded language support for this feature including Spanish (Mexico). Vehicle Motion Cues will now be available on Mac and provide enhanced customisation to reduce motion sickness.
Eye Tracking and Switch Control on iPhone, iPad and Apple Vision Pro will receive upgrades to support additional input methods and faster keyboard use.
Head Tracking will allow users to control devices with head movement. Switch Control will add support for Brain Computer Interfaces, allowing device control without physical actions.
Assistive Access will introduce a streamlined Apple TV app and allow developers to create more tailored experiences for users with intellectual and developmental disabilities. Music Haptics will be more customisable and support for Sound Recognition will be extended with Name Recognition for users who are deaf or hard of hearing.
Voice Control enhancements will include a new programming mode in Xcode for developers with limited mobility, vocabulary syncing across devices and expanded language support. Live Captions will now include more regional language variants such as English (India, Australia, UK, Singapore), Mandarin Chinese, Cantonese, Spanish, French, Japanese, German and Korean.
CarPlay updates will bring Large Text support and enhanced sound notifications for drivers or passengers who are deaf or hard of hearing.
Other new features allow users to temporarily share accessibility settings across devices, a new shortcut to help retain information and expanded video resources to guide personalisation of Apple products with accessibility features.
Apple Music, Apple Fitness+, Apple TV+, Apple Books and Apple Podcasts will feature stories, playlists and content to coincide with Global Accessibility Awareness Day. The App Store will highlight accessible apps and feature the story of Klemens Strasser, a developer committed to building accessible experiences.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 days ago
- Techday NZ
World's largest data breach exposes 16 billion credentials
The scale of the latest data breach, involving a staggering 16 billion new credentials and passwords, is forcing both experts and organisations to reckon with the ongoing weaknesses in global digital security. Described as the world's largest data breach, the incident has reportedly swept up data from a vast array of online platforms, including not only commercial giants like Apple and Google but also government services and numerous SaaS (Software as a Service) applications. Brian Soby, co-founder and CTO at AppOmni, whose company specialises in securing digital records, believes the breach was inevitable given the industry's reliance on outmoded security frameworks. Soby warns that the gravity of the situation goes beyond the raw numbers: "This isn't just a collection of old, previously leaked passwords; it appears to be a new, massive, and highly organised library of credentials." According to Soby, cybercriminals now hold a "roadmap for widespread account takeovers" that threatens the backbone of modern digital life — cloud services and SaaS applications — potentially outpacing many current security defences. Soby highlights a critical vulnerability at the heart of today's enterprises. While many organisations invest in identity management and access security projects, basic misconfigurations and failure to disable outdated forms of credential use leave them exposed. "Large credential dumps such as these are likely to highlight just how many organisations indeed remain vulnerable to credential attacks due to these insufficient protections," he adds. Spencer Young, Senior Vice President EMEA at cybersecurity firm Delinea, echoes the concern, underlining that static credentials, especially passwords which are seldom changed, represent an Achilles' heel. "Passwords alone – especially unrotated ones – leave consumers and organisations vulnerable to phishing, credential stuffing, and Pass-the-Hash attacks," he notes. Young stresses that the traditional advice of strong password hygiene is no longer sufficient. Instead, initiatives like automated password rotation and credential vaulting, which reduce the window of opportunity for attackers, should be the new standard. In terms of longer-term solutions, Young observes that passwordless authentication approaches are gaining traction. "Technologies such as biometrics, where biometric data remains encrypted and safely stored in the device and does not travel across the network, improves the authentication process," he explains. However, he warns that passwords themselves are far from obsolete; they are increasingly being relegated to the background as part of a layered, multifactor authorisation system that may include one-time passwords or magic links to enhance security. With cybercriminals orchestrating campaigns using vast troves of login data, the scale of weaponisation is unprecedented. Tim Eades, CEO and co-founder at Anetac, illustrates the dilemma facing organisations across the world, as these troves become "a commodity that are bought, sold, and weaponised in countless attacks." Eades notes that the unrelenting circulation of stolen records magnifies the risk over time, especially as new AI agents — sometimes deployed without adequate safeguards — can introduce further vulnerabilities and thousands of new access points for attackers. "The part that keeps CISOs up at night? These records circulate for years, the risk doesn't go away, it only grows over time." Raising further alarm, Eades points out that until affected organisations are identified, compromised individuals may have no warning or recourse. This opacity not only endangers users but also perpetuates a cycle in which threat actors vie to surpass one another, pushing the boundaries of data breaches ever further. He urges organisations to reinforce security measures: "Leaders should protect all credentials like they are the keys to the castle." Encouraging the use of unique passwords, two-factor authentication, and embedding a culture of security awareness are presented as essential starting points. Another concern arising from the breach is the "snowball effect" it might have on cyber-attacks, especially through the proliferation of sleeper accounts. Xavier Sheikrojan, Senior Risk Intelligence Manager at Signifyd, warns that fraudsters may use stolen credentials not just for immediate exploitation but to create dormant accounts for later and larger-scale attacks. He advocates for proactive action, urging businesses to monitor user behaviour, force password resets, and continually refine machine learning systems aimed at picking up fraudulent activity. As experts across the sector agree, the exposure of billions of records simultaneously marks a pivotal moment in the digital security landscape. While technology continues to advance, so too does the capacity and sophistication of cybercrime, prompting renewed calls for organisations and individuals alike to treat identity and access security with unwavering seriousness and vigilance.


Scoop
3 days ago
- Scoop
MakeDongle 2 - USB Dongle Protection For MacOS, Windows And Linux
Excel Software announced MakeDongle 2.0 for macOS or Windows. MakeDongle generates a secure USB dongle from a flash drive. The dongle grants a license to run protected software on all modern versions of Mac, Windows or Linux OS. MakeDongle complements a diverse suite of protection and licensing tools from Excel Software. Protected software can be stored on the computer or dongle itself. On application launch, the dongle is validated before the software is allowed to run. Each dongle can be generated in seconds. When building dongles, MakeDongle can copy multiple licenses, applications or installers to the USB flash drive. MakeDongle can be used standalone or with the QuickLicense, AppProtect or DocProtect products. It also works with licensing plugins for FileMaker and Xojo. To use MakeDongle alone, several coding interfaces are supported with sample code provided for popular programming languages. MakeDongle works with QuickLicense. QuickLicense supports many license types including Trial, Product, Try/Buy and Subscription. Software is protected by adding API programming commands or by using the AddLicense wrapping tool without programming. AddLicense is a popular choice for runtime environments like MAX, Adobe Air or Unity since application code and resources can be securely embedded within the EXE or APP file. Protected software can immediately launch when the appropriate dongle is present or optionally require a manual or online activation process. MakeDongle and QuickLicense give developers many options for software and hardware protection. Excel spreadsheets can be protected using QuickLicense and OfficeProtect to produce an EXE for Windows or APP for Mac. This protection can be combined with a USB dongle to allow the App to run. The application and encrypted data files can be stored on the dongle making them easily portable between computers. MakeDongle works with QuickLicenseRT Linux. QuickLicense and MakeDongle run on a Mac or Windows computer to produce a dongle and license files. The protected software run on a Linux computer with the dongle installed in any free USB port. MakeDongle works with DocProtect on Mac, Windows or Linux. DocProtect wraps PDF, Video, Image slide shows or HTML files into a Mac or Windows application. The protected document can be used on any computer when the dongle is present. MakeDongle, DocProtect and QuickLicense can be combined to support other license types and features. MakeDongle can be used with AppProtect to wrap Mac or Windows software into a protected application that only runs if the dongle is present. Dongle secured installers can be created using MakeDongle plus ClickInstall on Mac or Windows. The installer only runs if the dongle is present and can be distributed on the dongle itself. MakeDongle 2.0 is $495 for a Single User License on Mac or Windows. Produce unlimited dongles for any number of products. The product includes royalty-free distribution rights for protected software. MakeDongle Mac is a Universal (Intel & Apple Silicon) App that runs on macOS 10.14 or later. MakeDongle Windows runs on Windows 10 or 11. Visit the company web site for demonstration videos and product information.


Techday NZ
4 days ago
- Techday NZ
Jamf report finds phishing & infostealers surge on Apple devices
Jamf has released its Security 360 Report, highlighting significant security trends and risks for mobile and Mac devices within organisational environments worldwide. The report, which examines both mobile and macOS platforms, identifies phishing, infostealers, and operating system vulnerabilities as major concerns and areas where enterprises need to focus their cybersecurity efforts. According to Josh Stein, Vice President of Product Strategy at Jamf, the aim of the research is to help security professionals understand and manage the challenges posed by both longstanding and emerging threats. "Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked…nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community." Mobile threats The report notes that mobile devices are frequently the sole tools used by employees to access work resources, emphasising the need for robust defences across a variety of threat vectors. Jamf segmented its analysis of mobile device threats into four key areas: phishing, vulnerability management, application risk and malware, and spyware. Phishing attacks remain especially prevalent, with Jamf identifying approximately 10 million such attacks in the past year. The company reported that 25% of organisations experienced a social engineering incident and that one in ten users clicked on a malicious phishing link. The report suggests security training programmes and the adoption of layered, zero-trust security models can help mitigate these risks. In terms of vulnerability management, Jamf found that 32% of organisations had at least one device with critical vulnerabilities, and that 55.1% of mobile devices in use within workplaces were running on a vulnerable operating system. The company highlighted the importance of timely updates to patch known vulnerabilities, as provided by both Apple and Google. The research further discussed application risk, referencing Jamf's previous identification of a Transparency, Consent and Control (TCC) bypass flaw on iOS. The company demonstrated how side-loaded apps can compromise user privacy and emphasised the need for security controls that extend beyond just keeping operating systems up to date. Spyware and advanced malware were identified as threats that, though less frequent than on some platforms, are extremely sophisticated when they do emerge. High-profile individuals, including journalists, politicians, and diplomats, are at particular risk, with Apple sending compromise notifications to users in around 100 countries last year. The report recommends treating mobile devices with the same level of security as other endpoints in the enterprise environment. Threats to macOS Mac devices, which were once principally used by executives and creatives, have become common fixtures in enterprises across a range of sectors. According to the report, this proliferation has broadened the attack surface and increased the diversity of threats targeting the platform. Jamf outlined three principal areas of concern for macOS: application risk and malware, vulnerability management, and social engineering. Infostealers have become the dominant form of malware on Macs, accounting for 28.36% of all Mac malware analysed by Jamf, compared to just 0.25% in the previous year's findings. The report singles out employees in industries such as cryptocurrency as needing to be particularly alert, advocating for both ongoing training and adequate technological defences. The report also addresses myths about macOS security, noting that vulnerabilities persist despite perceptions of invulnerability. Jamf highlighted a recently discovered flaw in Gatekeeper, a mechanism intended to stop unverified apps from being run. The report notes the requirement for both effective technical controls and regular employee training to counter risks posed by software vulnerabilities. Social engineering threats, including phishing, exploit the widespread adoption of Macs in the workplace. Jamf cited campaigns that use professional social media platforms such as LinkedIn as initial attack vectors, rather than the email channels typically associated with phishing. The company recommends comprehensive employee training on all forms of phishing relevant to Mac users. Methodology The findings in the Security 360 Report are based on the analysis of 1.4 million devices protected by Jamf, conducted in the first quarter of 2025. The scope of analysis covered the previous year, included users in 90 countries, and spanned multiple mobile and desktop platforms, including iOS, iPadOS, Android, and macOS devices. The report draws on Jamf's proprietary Threat Intelligence, incorporating data from original research, device usage metrics, and analysis of news and external data feeds.