Video platform Vimeo will pivot its business away from being a place for users to browse for and watch videos, to focus on selling software tools to content creators. Vimeo CEO Anjali Sud confirmed the move to Axios today, explaining that the company saw „so much organic growth“ from software tools it already sells that the pivot „became a no-brainer.“
Currently, Vimeo calls itself „the high quality home for video hosting and watching,“ with many videos like short films, documentaries, and more residing on the service. Vimeo found a niche for smaller content creators to host their videos on its site, since they could sell their content to [...]
Earlier in the summer, Facebook and Instagram each promised that users would soon be able to access a suite of digital health tools to help them manage their time on the social networks and promote healthier habits. Today, the companies revealed these tools in a press release and confirmed they will be rolling out to all mobile app users „soon.“
The tools will be found within the settings page on both iOS apps — on Instagram it’ll be called „Your Activity“ and on Facebook it’ll be called „Your Time on Facebook.“ At the top of the page, the activity dashboard will highlight your daily average time for each app on the [...]
Apple has confirmed that it is closing a technological loophole that allows law enforcement officials to hack into iPhones through USB-based hardware solutions like the GrayKey box, reports The New York Times.
Apple said it was planning an iPhone software update that would effectively disable the phone’s charging and data port — the opening where users plug in headphones, power cables and adapters — an hour after the phone is locked. In order to transfer data to or from the iPhone using the port, a person would first need to enter the phone’s password.
As we shared last week, the feature that prevents USB accessories from connecting to an iPhone [...]
Hackers have had an „easy way“ to get certain malware past signature checks in third-party security tools since Apple’s OS X Leopard operating system in 2007, according to a detailed new report today by Ars Technica. Researchers discovered that hackers could essentially trick the security tools — designed to sniff out suspiciously signed software — into thinking the malware was officially signed by Apple while they in fact hid malicious software.
The researchers said that the signature bypassing method is so „easy“ and „trivial“ that pretty much any hacker who discovered it could pass off malicious code as an app that [...]