
Do you want a skinny smartphone with worse battery life?
Polling by YouGov has found that what people want most from their smartphones is better battery life. So why are Apple and Samsung pitching you skinnier but potentially battery-compromised phones?
I want to hold these skinnier phones in my hand and see if I'm bowled over by the difference, especially once you add a phone case. It could dent your enthusiasm, though, knowing that these new designs may be motivated most by Samsung and Apple's desperation to sell you something new – anything.
Can you tell the difference?
Samsung acknowledged it really doesn't know if you want a skinnier phone.
Blake Gaiser, head of smartphone product management at Samsung Electronics America, says the company is making a limited number of S25 Edge devices and they won't be sold everywhere.
He said it's a test of whether you want what he called a 'Goldilocks device' – not as fancy as Samsung's top-tier model at $1300, but jazzier than other high-end Samsung phones.
Samsung says the S25 Edge is 5.8mm thick, not including the protruding camera lenses on the back of the phone, and assuming you don't use a case. For comparison, Samsung's new S25 (non-thin) phone is 7.2mm and the iPhone 16 is 7.8mm.
Eyeballing my ruler, I can barely see the difference between 6mm and 7mm.
Gaiser said the new model's size and weight 'makes a huge difference in your hand' – and some early reviewers said the same.
But the trade-off of slimness is a lower capacity battery than that of comparable new Galaxy devices, which typically means shorter battery life. That could be too big of a compromise for some of you.
Apple's rumoured new 5.5mm deep iPhone Air will also reportedly have drawbacks, including wimpier battery life. To compensate, Apple will sell a case with a backup battery built in, the Information reported.
Gaiser said Samsung made the phone more efficient to go easy on the battery. Apple plans to do the same with its new models, Bloomberg News reported.
Skinny phones are born of desperation
Ultimately, the motivation behind slimmer phones is jolting smartphone sales, which are lower today than they were in 2017, according to figures from research firm IDC.
You know why. Smartphones don't change much from year to year, and they're good enough now to hold on to them for a long time.
Advertisement Advertise with NZME.
That makes a smartphone like a car and a fridge – products we rely on but don't upgrade often. That's not great for Samsung and Apple, so they'll try anything to get you excited about something new.
Trying out skinny phones, even if you don't embrace them, could also give Apple and Samsung a chance to test wild technologies that you might like, like phones that fold open to reveal more screen real estate.
The concept hasn't yet caught on widely because the devices cost a fortune and most of us aren't sure why we'd want one. (Apple is aiming for its first folding smartphone by 2027, Bloomberg News reported.)
Myriam Joire, a technology journalist and podcaster, says skinny phones could catch on, as lighter, slimmer laptops did following Apple's introduction of its MacBook Air in 2008. But she said Samsung and Apple didn't need to make so many trade-offs.
She said Chinese phone brands like Xiaomi and OnePlus, which are hard to buy in the United States, use novel battery technology created for electric cars to make slim phones with great battery life, and at significantly lower prices than higher-end phones from Samsung and Apple.
Apple and Samsung, Joire said, 'are not innovating anymore because they have no competition' in North America.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
a day ago
- Techday NZ
World's largest data breach exposes 16 billion credentials
The scale of the latest data breach, involving a staggering 16 billion new credentials and passwords, is forcing both experts and organisations to reckon with the ongoing weaknesses in global digital security. Described as the world's largest data breach, the incident has reportedly swept up data from a vast array of online platforms, including not only commercial giants like Apple and Google but also government services and numerous SaaS (Software as a Service) applications. Brian Soby, co-founder and CTO at AppOmni, whose company specialises in securing digital records, believes the breach was inevitable given the industry's reliance on outmoded security frameworks. Soby warns that the gravity of the situation goes beyond the raw numbers: "This isn't just a collection of old, previously leaked passwords; it appears to be a new, massive, and highly organised library of credentials." According to Soby, cybercriminals now hold a "roadmap for widespread account takeovers" that threatens the backbone of modern digital life — cloud services and SaaS applications — potentially outpacing many current security defences. Soby highlights a critical vulnerability at the heart of today's enterprises. While many organisations invest in identity management and access security projects, basic misconfigurations and failure to disable outdated forms of credential use leave them exposed. "Large credential dumps such as these are likely to highlight just how many organisations indeed remain vulnerable to credential attacks due to these insufficient protections," he adds. Spencer Young, Senior Vice President EMEA at cybersecurity firm Delinea, echoes the concern, underlining that static credentials, especially passwords which are seldom changed, represent an Achilles' heel. "Passwords alone – especially unrotated ones – leave consumers and organisations vulnerable to phishing, credential stuffing, and Pass-the-Hash attacks," he notes. Young stresses that the traditional advice of strong password hygiene is no longer sufficient. Instead, initiatives like automated password rotation and credential vaulting, which reduce the window of opportunity for attackers, should be the new standard. In terms of longer-term solutions, Young observes that passwordless authentication approaches are gaining traction. "Technologies such as biometrics, where biometric data remains encrypted and safely stored in the device and does not travel across the network, improves the authentication process," he explains. However, he warns that passwords themselves are far from obsolete; they are increasingly being relegated to the background as part of a layered, multifactor authorisation system that may include one-time passwords or magic links to enhance security. With cybercriminals orchestrating campaigns using vast troves of login data, the scale of weaponisation is unprecedented. Tim Eades, CEO and co-founder at Anetac, illustrates the dilemma facing organisations across the world, as these troves become "a commodity that are bought, sold, and weaponised in countless attacks." Eades notes that the unrelenting circulation of stolen records magnifies the risk over time, especially as new AI agents — sometimes deployed without adequate safeguards — can introduce further vulnerabilities and thousands of new access points for attackers. "The part that keeps CISOs up at night? These records circulate for years, the risk doesn't go away, it only grows over time." Raising further alarm, Eades points out that until affected organisations are identified, compromised individuals may have no warning or recourse. This opacity not only endangers users but also perpetuates a cycle in which threat actors vie to surpass one another, pushing the boundaries of data breaches ever further. He urges organisations to reinforce security measures: "Leaders should protect all credentials like they are the keys to the castle." Encouraging the use of unique passwords, two-factor authentication, and embedding a culture of security awareness are presented as essential starting points. Another concern arising from the breach is the "snowball effect" it might have on cyber-attacks, especially through the proliferation of sleeper accounts. Xavier Sheikrojan, Senior Risk Intelligence Manager at Signifyd, warns that fraudsters may use stolen credentials not just for immediate exploitation but to create dormant accounts for later and larger-scale attacks. He advocates for proactive action, urging businesses to monitor user behaviour, force password resets, and continually refine machine learning systems aimed at picking up fraudulent activity. As experts across the sector agree, the exposure of billions of records simultaneously marks a pivotal moment in the digital security landscape. While technology continues to advance, so too does the capacity and sophistication of cybercrime, prompting renewed calls for organisations and individuals alike to treat identity and access security with unwavering seriousness and vigilance.


Techday NZ
4 days ago
- Techday NZ
Jamf report finds phishing & infostealers surge on Apple devices
Jamf has released its Security 360 Report, highlighting significant security trends and risks for mobile and Mac devices within organisational environments worldwide. The report, which examines both mobile and macOS platforms, identifies phishing, infostealers, and operating system vulnerabilities as major concerns and areas where enterprises need to focus their cybersecurity efforts. According to Josh Stein, Vice President of Product Strategy at Jamf, the aim of the research is to help security professionals understand and manage the challenges posed by both longstanding and emerging threats. "Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked…nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community." Mobile threats The report notes that mobile devices are frequently the sole tools used by employees to access work resources, emphasising the need for robust defences across a variety of threat vectors. Jamf segmented its analysis of mobile device threats into four key areas: phishing, vulnerability management, application risk and malware, and spyware. Phishing attacks remain especially prevalent, with Jamf identifying approximately 10 million such attacks in the past year. The company reported that 25% of organisations experienced a social engineering incident and that one in ten users clicked on a malicious phishing link. The report suggests security training programmes and the adoption of layered, zero-trust security models can help mitigate these risks. In terms of vulnerability management, Jamf found that 32% of organisations had at least one device with critical vulnerabilities, and that 55.1% of mobile devices in use within workplaces were running on a vulnerable operating system. The company highlighted the importance of timely updates to patch known vulnerabilities, as provided by both Apple and Google. The research further discussed application risk, referencing Jamf's previous identification of a Transparency, Consent and Control (TCC) bypass flaw on iOS. The company demonstrated how side-loaded apps can compromise user privacy and emphasised the need for security controls that extend beyond just keeping operating systems up to date. Spyware and advanced malware were identified as threats that, though less frequent than on some platforms, are extremely sophisticated when they do emerge. High-profile individuals, including journalists, politicians, and diplomats, are at particular risk, with Apple sending compromise notifications to users in around 100 countries last year. The report recommends treating mobile devices with the same level of security as other endpoints in the enterprise environment. Threats to macOS Mac devices, which were once principally used by executives and creatives, have become common fixtures in enterprises across a range of sectors. According to the report, this proliferation has broadened the attack surface and increased the diversity of threats targeting the platform. Jamf outlined three principal areas of concern for macOS: application risk and malware, vulnerability management, and social engineering. Infostealers have become the dominant form of malware on Macs, accounting for 28.36% of all Mac malware analysed by Jamf, compared to just 0.25% in the previous year's findings. The report singles out employees in industries such as cryptocurrency as needing to be particularly alert, advocating for both ongoing training and adequate technological defences. The report also addresses myths about macOS security, noting that vulnerabilities persist despite perceptions of invulnerability. Jamf highlighted a recently discovered flaw in Gatekeeper, a mechanism intended to stop unverified apps from being run. The report notes the requirement for both effective technical controls and regular employee training to counter risks posed by software vulnerabilities. Social engineering threats, including phishing, exploit the widespread adoption of Macs in the workplace. Jamf cited campaigns that use professional social media platforms such as LinkedIn as initial attack vectors, rather than the email channels typically associated with phishing. The company recommends comprehensive employee training on all forms of phishing relevant to Mac users. Methodology The findings in the Security 360 Report are based on the analysis of 1.4 million devices protected by Jamf, conducted in the first quarter of 2025. The scope of analysis covered the previous year, included users in 90 countries, and spanned multiple mobile and desktop platforms, including iOS, iPadOS, Android, and macOS devices. The report draws on Jamf's proprietary Threat Intelligence, incorporating data from original research, device usage metrics, and analysis of news and external data feeds.


Techday NZ
10-06-2025
- Techday NZ
Apple unveils macOS Tahoe 26 with new design & AI features
Apple has previewed macOS Tahoe 26, the next major update to its desktop operating system, bringing a new design, enhanced Continuity features, significant Spotlight updates, and expanded Apple Intelligence capabilities. Design updates The new design introduces the Liquid Glass material, offering translucent effects that reflect and refract the surroundings. Key elements such as the Dock, sidebars, and toolbars have been refined to focus on user content, and the menu bar is now completely transparent to maximise display space. Customisation options have been expanded, allowing users to arrange controls in the menu bar and Control Centre, and apply different colours or emojis to folders and app icons. New light and dark appearances for app icons, as well as updated wallpapers and theme colours, are also included. Continuity improvements macOS Tahoe introduces the Phone app to the Mac via Continuity, allowing users to relay cellular calls from their iPhone, access Recents, Favourites, and Voicemails, and use features such as Call Screening and Hold Assist. Call Screening answers calls from unknown numbers and gathers information for the user, while Hold Assist enables users to keep their place in a queue and continue working. Live Activities from iPhone are now integrated into the Mac menu bar, displaying real-time events such as flights, rides, or sports scores. Clicking a Live Activity opens iPhone Mirroring for further details and interaction. Spotlight enhancements Spotlight receives an update with the ability to execute hundreds of actions, such as sending emails or creating notes, directly from the search interface. Search results are grouped and prioritised by relevance, with new filtering and browsing options for faster content discovery, and improved support for documents in third-party cloud drives. Spotlight now supports actions from both Apple and third-party apps via the App Intents API. Users can also run shortcuts and perform personalised actions based on routines, as well as use quick keys for rapid commands. Apple Intelligence features Apple Intelligence expands with features focused on productivity, communication, and creativity. Live Translation provides text and audio translation in real time across Messages, FaceTime, and phone calls, using on-device models to maintain privacy. Shortcuts can now leverage Apple Intelligence models for tasks such as text summarisation and automatic image creation. Shortcuts can run at designated times or upon specific actions. Users may also access ChatGPT for broader world knowledge within shortcuts. Genmoji and Image Playground receive updates allowing users to customise emoji attributes and apply various artistic styles, including those powered by ChatGPT. Reminders can now be automatically categorised and action items identified through Apple Intelligence. Gaming and developer tools The release introduces the Apple Games app, centralising games, recommendations, and social features. Game Overlay provides fast access to system settings and social actions during gameplay. The new Metal 4 framework offers advanced graphics and rendering technologies for developers. Upcoming games for Mac include titles such as Crimson Desert, InZOI, Cyberpunk 2077, and several others, utilising features like MetalFX Upscaling and support for Apple's M3 and M4 chips with ray tracing. Additional features Other updates in macOS Tahoe include refreshed Safari design and faster performance, new features in Messages such as Backgrounds, Polls, and improved group chat navigation, as well as the launch of the Journal app for Mac. Photos receives a design update with personalisation improvements, FaceTime introduces a redesigned landing page and floating controls, and Notes gains markdown compatibility and support for audio transcription from Phone app calls. Accessibility developments include Magnifier support, Accessibility Reader, enhanced Braille Access, and Vehicle Motion Cues to help reduce motion sickness. The Passwords app tracks changes and version history for users' credentials. "macOS is the heart and soul of the Mac, and with Tahoe, we're building on what users love most. Whether you're a power user or just getting started on Mac, there's something for everyone, with even more features to turbocharge productivity and make working across Mac and iPhone more seamlessly than ever before," said Craig Federighi, Apple's Senior Vice President of Software Engineering. "With its gorgeous new design, amazing Continuity experiences, powerful enhancements to Spotlight, more intelligent shortcuts, and updates to Apple Intelligence, the Mac experience is better than ever."