Wednesday, February 5, 2020

Apple Card Said to Gain OFX Export Option 'Within the Next Few Days'

https://ift.tt/2v5qXvy

Apple Card users will be able to export their transaction data in an OFX file format for use with third-party financial apps "within the next few days," a support representative said in an online chat with customer Jed Schmidt.

The exporting feature rolled out last month, but only with CSV file support. Apple said an OFX option would be available in the future. The option to export transactions shows up when a monthly statement is available, and the data can then be imported into budgeting apps like Quicken and Mint.


How to Export and Download Apple Card Transactions

  1. Open the Wallet app on your iPhone and tap on Apple Card.
  2. Tap on Card Balance.
  3. Under Statements, tap on the statement you want to export.
  4. Tap on Export Transactions, and then email, print, save, or share the file.
Apple launched its credit card in the United States in August. Key features include color-coded spending summaries in the Wallet app, no fees beyond any applicable interest, and up to three percent cashback on purchases paid out daily.

To apply for an ‌Apple Card‌, simply open the Wallet app on an iPhone running iOS 12.4 or later, tap the plus button in the top-right corner, and follow the on-screen steps. The process takes just a few minutes, and if approved, your digital ‌Apple Card‌ will be ready for purchases immediately. A physical titanium-based Apple Card is also available for use at retail stores that do not accept contactless payments.




This article, "Apple Card Said to Gain OFX Export Option 'Within the Next Few Days'" first appeared on MacRumors.com

Discuss this article in our forums



from MacRumors: Mac News and Rumors - All Stories https://ift.tt/2S1lazX

NVIDIA GeForce Now aims to take on Stadia with unique $5 approach to cloud gaming


via Chrome Unboxed – The Latest Chrome OS News https://ift.tt/2S1s6gL

Today Only: This monster Core i5 Chromebook is only $349


via Chrome Unboxed – The Latest Chrome OS News https://ift.tt/2SkCn6v

Look out Google Stadia: Nvidia GeForce NOW coming to Chromebooks


via About Chromebooks https://ift.tt/2v2cvUZ

Google Search Now Allows Jio, Airtel, Vodafone Idea and BSNL Users Find the Best Prepaid Recharge Plans


via News – MySmartPrice https://ift.tt/2ul8Mlp

Google Translate App Updated With Dark Mode Support on iPhone and iPad

https://ift.tt/372twvo

Nearly five months after the release of iOS 13, Google has finally updated its Translate app with Dark Mode support on the iPhone and iPad, although the color scheme is dark gray rather than true black.

Dark Mode in the Google Translate app is tied to the system-level appearance selected in Settings > Display & Brightness > Appearance.


Google has been slowly adding Dark Mode support to its iOS apps, but the option is still not available for all Gmail app users.

Google Translate is a free download on the App Store.


This article, "Google Translate App Updated With Dark Mode Support on iPhone and iPad" first appeared on MacRumors.com

Discuss this article in our forums



from MacRumors: Mac News and Rumors - All Stories https://ift.tt/2vSjobW

Security Researchers Expose Vulnerability in Philips Hue Smart Bulbs

https://ift.tt/nvEILJ

A new vulnerability has been discovered in the Philips Hue smart lighting system that could let hackers gain access to the local host network and other devices connected to it.


Discovered by Check Point Research and demonstrated in a video, the flaw relates to the Zigbee communication protocol used by Philips Hue bulbs and a number of other smart home devices, including Amazon's Ring, Samsung SmartThings, Ikea Tradfri, and Belkin's WeMo.

According to the security researchers, the vulnerability could allow a local attacker to take control of Hue light bulbs using a malicious over-the-air update and cause the bulbs to exhibit random behavior and become uncontrollable. If the user then deletes the bulb and re-adds it in the Hue app, the attacker is able to gain access to the Hue bridge.
The hacker-controlled bulb with updated firmware then uses the ZigBee protocol vulnerabilities to trigger a heap-based buffer overflow on the control bridge, by sending a large amount of data to it. This data also enables the hacker to install malware on the bridge – which is in turn connected to the target business or home network.
Every Philips Hue Hub connected to the internet should have automatically updated itself to version 1935144040, which patches this specific vulnerability. Users can check themselves by looking to see if any updates are available for the Hue app.

The flaw actually relies on a vulnerability that was originally discovered in 2016 and which can't be patched, as it would require a hardware update to the smart bulbs.

"Many of us are aware that IoT devices can pose a security risk," said Yaniv Balmas, Head of Cyber Research at Check Point Research. "But this research shows how even the most mundane, seemingly 'dumb' devices such as lightbulbs can be exploited by hackers and used to take over networks, or plant malware."


This article, "Security Researchers Expose Vulnerability in Philips Hue Smart Bulbs" first appeared on MacRumors.com

Discuss this article in our forums



from MacRumors: Mac News and Rumors - All Stories https://ift.tt/2S0VVxM