logo
CarPlay Ultra debuts in Aston Martin

CarPlay Ultra debuts in Aston Martin

NZ Autocar16-05-2025

Apple has officially launched CarPlay Ultra , a next-generation upgrade of its in-car infotainment system, and it's set to change the way drivers interact with their vehicles.
First seen in action inside the high-performance Aston Martin DBX 707, CarPlay Ultra goes far beyond simple phone mirroring to offer a fully integrated digital cockpit experience. And with several major manufacturers already lined up to implement the technology, this could mark a turning point in automotive software design.
CarPlay, as we've known it, has essentially functioned as a mirrored smartphone interface, pulling selected apps and functions like navigation, music and messages onto the car's central screen. But CarPlay Ultra takes a leap forward. No longer just a phone-on-a-screen, the system blends Apple's intuitive design language with live vehicle data and native user-interface (UI) features to create a more unified digital experience across all the screens in a car, including the digital instrument cluster.
The big shift comes in how CarPlay Ultra handles information. There are now three layers of content delivery. First, the familiar mirrored apps from your iPhone. Then, what Apple calls local UI , which integrates real-time data from the car (like fuel level, speed and climate settings) into the Apple interface. Finally, there's punch-through UI , which allows certain pages from the car's native system, such as the reversing camera or high-end audio settings, to appear within the CarPlay environment without alteration.
In practice, it means no more jumping between two clashing interfaces. Everything from maps to media to seat heating can be accessed via the same clean, Apple-designed visual language. And it's fully responsive to your car's hardware. In the DBX 707, for instance, the system spans a 10.25-inch touchscreen and a digital instrument cluster, adapting dynamically to both.
Read more 2022 Aston Martin DBX707 review
One of the headline features is CarPlay Ultra's ability to take over the instrument cluster. Apple provides manufacturers with a design toolkit, which each car brand can customise to suit their models. Aston Martin has developed multiple cluster layouts, from classic twin roundels in racing green to a full-screen navigation view with minimal driver distraction. Swiping left or right on the steering wheel's thumb pad allows drivers to switch between these options, while up and down gestures change the data displayed in the centre such as tyre pressures, trip info, or media.
Customisation doesn't stop there. Within the settings menu, users can tweak colours and some visual elements (though layout choices remain fixed, for now). CarPlay Ultra also supports full integration of climate controls, media, and other key functions. You can interact via the screen, physical buttons (if your car has them), or Siri, which is now linked directly to the voice command button on the wheel.
From May 15, all new Aston Martins sold in the US will come pre-loaded with CarPlay Ultra. Customers with recent models can have it retrofitted at a dealership. A global rollout is expected within the next year. And it's not just Aston on board; brands like Porsche, Hyundai, Renault, Volvo and Ford have confirmed upcoming models with CarPlay Ultra support.
To use CarPlay Ultra, drivers will need a car with a digital instrument cluster, iOS 18.4 or later, and an iPhone 12 or newer. The connection is entirely wireless after the first pairing, which is either via cable or wireless sync.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

World's largest data breach exposes 16 billion credentials
World's largest data breach exposes 16 billion credentials

Techday NZ

time2 days ago

  • Techday NZ

World's largest data breach exposes 16 billion credentials

The scale of the latest data breach, involving a staggering 16 billion new credentials and passwords, is forcing both experts and organisations to reckon with the ongoing weaknesses in global digital security. Described as the world's largest data breach, the incident has reportedly swept up data from a vast array of online platforms, including not only commercial giants like Apple and Google but also government services and numerous SaaS (Software as a Service) applications. Brian Soby, co-founder and CTO at AppOmni, whose company specialises in securing digital records, believes the breach was inevitable given the industry's reliance on outmoded security frameworks. Soby warns that the gravity of the situation goes beyond the raw numbers: "This isn't just a collection of old, previously leaked passwords; it appears to be a new, massive, and highly organised library of credentials." According to Soby, cybercriminals now hold a "roadmap for widespread account takeovers" that threatens the backbone of modern digital life — cloud services and SaaS applications — potentially outpacing many current security defences. Soby highlights a critical vulnerability at the heart of today's enterprises. While many organisations invest in identity management and access security projects, basic misconfigurations and failure to disable outdated forms of credential use leave them exposed. "Large credential dumps such as these are likely to highlight just how many organisations indeed remain vulnerable to credential attacks due to these insufficient protections," he adds. Spencer Young, Senior Vice President EMEA at cybersecurity firm Delinea, echoes the concern, underlining that static credentials, especially passwords which are seldom changed, represent an Achilles' heel. "Passwords alone – especially unrotated ones – leave consumers and organisations vulnerable to phishing, credential stuffing, and Pass-the-Hash attacks," he notes. Young stresses that the traditional advice of strong password hygiene is no longer sufficient. Instead, initiatives like automated password rotation and credential vaulting, which reduce the window of opportunity for attackers, should be the new standard. In terms of longer-term solutions, Young observes that passwordless authentication approaches are gaining traction. "Technologies such as biometrics, where biometric data remains encrypted and safely stored in the device and does not travel across the network, improves the authentication process," he explains. However, he warns that passwords themselves are far from obsolete; they are increasingly being relegated to the background as part of a layered, multifactor authorisation system that may include one-time passwords or magic links to enhance security. With cybercriminals orchestrating campaigns using vast troves of login data, the scale of weaponisation is unprecedented. Tim Eades, CEO and co-founder at Anetac, illustrates the dilemma facing organisations across the world, as these troves become "a commodity that are bought, sold, and weaponised in countless attacks." Eades notes that the unrelenting circulation of stolen records magnifies the risk over time, especially as new AI agents — sometimes deployed without adequate safeguards — can introduce further vulnerabilities and thousands of new access points for attackers. "The part that keeps CISOs up at night? These records circulate for years, the risk doesn't go away, it only grows over time." Raising further alarm, Eades points out that until affected organisations are identified, compromised individuals may have no warning or recourse. This opacity not only endangers users but also perpetuates a cycle in which threat actors vie to surpass one another, pushing the boundaries of data breaches ever further. He urges organisations to reinforce security measures: "Leaders should protect all credentials like they are the keys to the castle." Encouraging the use of unique passwords, two-factor authentication, and embedding a culture of security awareness are presented as essential starting points. Another concern arising from the breach is the "snowball effect" it might have on cyber-attacks, especially through the proliferation of sleeper accounts. Xavier Sheikrojan, Senior Risk Intelligence Manager at Signifyd, warns that fraudsters may use stolen credentials not just for immediate exploitation but to create dormant accounts for later and larger-scale attacks. He advocates for proactive action, urging businesses to monitor user behaviour, force password resets, and continually refine machine learning systems aimed at picking up fraudulent activity. As experts across the sector agree, the exposure of billions of records simultaneously marks a pivotal moment in the digital security landscape. While technology continues to advance, so too does the capacity and sophistication of cybercrime, prompting renewed calls for organisations and individuals alike to treat identity and access security with unwavering seriousness and vigilance.

Jamf report finds phishing & infostealers surge on Apple devices
Jamf report finds phishing & infostealers surge on Apple devices

Techday NZ

time5 days ago

  • Techday NZ

Jamf report finds phishing & infostealers surge on Apple devices

Jamf has released its Security 360 Report, highlighting significant security trends and risks for mobile and Mac devices within organisational environments worldwide. The report, which examines both mobile and macOS platforms, identifies phishing, infostealers, and operating system vulnerabilities as major concerns and areas where enterprises need to focus their cybersecurity efforts. According to Josh Stein, Vice President of Product Strategy at Jamf, the aim of the research is to help security professionals understand and manage the challenges posed by both longstanding and emerging threats. "Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked…nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community." Mobile threats The report notes that mobile devices are frequently the sole tools used by employees to access work resources, emphasising the need for robust defences across a variety of threat vectors. Jamf segmented its analysis of mobile device threats into four key areas: phishing, vulnerability management, application risk and malware, and spyware. Phishing attacks remain especially prevalent, with Jamf identifying approximately 10 million such attacks in the past year. The company reported that 25% of organisations experienced a social engineering incident and that one in ten users clicked on a malicious phishing link. The report suggests security training programmes and the adoption of layered, zero-trust security models can help mitigate these risks. In terms of vulnerability management, Jamf found that 32% of organisations had at least one device with critical vulnerabilities, and that 55.1% of mobile devices in use within workplaces were running on a vulnerable operating system. The company highlighted the importance of timely updates to patch known vulnerabilities, as provided by both Apple and Google. The research further discussed application risk, referencing Jamf's previous identification of a Transparency, Consent and Control (TCC) bypass flaw on iOS. The company demonstrated how side-loaded apps can compromise user privacy and emphasised the need for security controls that extend beyond just keeping operating systems up to date. Spyware and advanced malware were identified as threats that, though less frequent than on some platforms, are extremely sophisticated when they do emerge. High-profile individuals, including journalists, politicians, and diplomats, are at particular risk, with Apple sending compromise notifications to users in around 100 countries last year. The report recommends treating mobile devices with the same level of security as other endpoints in the enterprise environment. Threats to macOS Mac devices, which were once principally used by executives and creatives, have become common fixtures in enterprises across a range of sectors. According to the report, this proliferation has broadened the attack surface and increased the diversity of threats targeting the platform. Jamf outlined three principal areas of concern for macOS: application risk and malware, vulnerability management, and social engineering. Infostealers have become the dominant form of malware on Macs, accounting for 28.36% of all Mac malware analysed by Jamf, compared to just 0.25% in the previous year's findings. The report singles out employees in industries such as cryptocurrency as needing to be particularly alert, advocating for both ongoing training and adequate technological defences. The report also addresses myths about macOS security, noting that vulnerabilities persist despite perceptions of invulnerability. Jamf highlighted a recently discovered flaw in Gatekeeper, a mechanism intended to stop unverified apps from being run. The report notes the requirement for both effective technical controls and regular employee training to counter risks posed by software vulnerabilities. Social engineering threats, including phishing, exploit the widespread adoption of Macs in the workplace. Jamf cited campaigns that use professional social media platforms such as LinkedIn as initial attack vectors, rather than the email channels typically associated with phishing. The company recommends comprehensive employee training on all forms of phishing relevant to Mac users. Methodology The findings in the Security 360 Report are based on the analysis of 1.4 million devices protected by Jamf, conducted in the first quarter of 2025. The scope of analysis covered the previous year, included users in 90 countries, and spanned multiple mobile and desktop platforms, including iOS, iPadOS, Android, and macOS devices. The report draws on Jamf's proprietary Threat Intelligence, incorporating data from original research, device usage metrics, and analysis of news and external data feeds.

Reveals and deals at Fieldays this year
Reveals and deals at Fieldays this year

NZ Autocar

time11-06-2025

  • NZ Autocar

Reveals and deals at Fieldays this year

The National Fieldays kicked off in Hamilton today, thousands in attendance, many looking for a bargain on something. Billed as the Southern Hemisphere's largest agricultural event, all manner of machinery and farming innovations are on display, the vast majority of which a townie like myself knows absolutely nothing about. Amongst the farm machinery however are a few of the car brands with their latest wares on display. Fieldays is about as close to a car show there is in New Zealand, and this year there were a few new vehicles making their public debut. Among them is the LDV Terron 9, one big double cab ute that is landing at $59,990. Its 2.5-litre turbodiesel makes 163.5kW and 520Nm of torque and the Terron 9 has the usual 3500kg braked towing capacity. It's 5.5m long, and 1997mm wide with a 1100kg payload. 4WD is standard with multi-terrain modes. Along with dual 12.3-inch screens inside, there is wireless CarPlay and Android Auto and a 360 degree camera. Terron 9 is backed by a seven-year/200,000km warranty. There's just one variant at launch, and it will sell alongside the T60, which remains in the range as a (slightly) smaller double cab option for buyers. The Subaru Forester was also on display, the new generation making its debut as well. Leading the line up is a new and improved hybrid version touting Subaru's full time AWD system. The news is that supply will be limited as the Japanese market alone is already holding 15,000 orders for the new model, which is beyond the firm's yearly production capacity. So if you're interested, register your intent now. Find out all the details and pricing here. KGM, formerly known as SsangYong if you haven't been paying attention, pulled the covers off a new hybrid version of the Torres mid-sized SUV. At this stage, the details are scant, other than to say the brand will be testing the model locally and evaluating it for our market. But given the interest and rising demand for hybrid SUVs, you can bet it will be added to the local showroom at some point alongside the petrol and EV versions already on sale. Ford had its Ranger Super Duty on display, a pre-production model fitted with a locally-sourced work body on the rear. No word on pricing yet, but Ford sees opportunities with both the wellside version for those that like to tow and the cab chassis for more specialised work vehicles. Also new is the Transit Courier Trend, a city-friendly small van that is priced at $49,990. It has two rows of seats, the ones in the rear able to fold up out of the way to increase cargo space. It's powered by a 1.0-litre petrol turbo with 92kW and 170Nm and channels that to the front wheels via a seven-speed auto. It has dual sliding side doors and a pair of barn style doors on the rear. It looks to be a versatile machine that some businesses might find to be the right fit. There is also a passenger version called the Tourneo Courier Active at $55,990 with the same powertrain and sliding side doors but the interior is more civilised and there is a rear hatch. BYD had its Shark 6 on display, sporting a range of different canopy options and other accessories, among them one with a flat deck conversion. This is done by BYD NZ, which ensures the accessory power outlets, charge ports and venting fuel filler are all sorted properly. The deck on display wasn't cheap, some $15,990, due to the relocation of those things mentioned and others like the blind spot monitoring and reverse sensors. BYD NZ said that it expects to have a cab chassis Shark 6 available in the near future, costing between $1500 and $2000 less than the current wellside. Further down the line, expect single and extra cab versions of the Shark also. Next door you'll find GWM with its Cannon Alpha PHEV front and centre, another of the hybrid utes on display, with Ford also having its PHEV Ranger on show too. Toyota had a big presence with all manner of Cruisers and Hilux models decked out in accessories, and you get a deal on Triton at the Mitsubishi stand. JAC also has a big presence, with its PHEV ute on display, the Hunter, though that is not yet ready for sale, described as being in its prototype stage. Mahindra had its new XUV 3XO on site, read all about that here, and the massive GMC Yukon Denali was there too, read more about that here. Even Tesla was there, with its pointless Cybertruck, proving the brand must be in bad shape Fieldays is on now until 14 June at Mystery Creek, Hamilton.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store