ThunderMag revives MagSafe for Thunderbolt 3 connections

By

ThunderMag replaces MagSafe for USB-C and Thunderbolt 3 connections.
ThunderMag replaces MagSafe for USB-C and Thunderbolt 3 connections.
Photo: innerexile

MagSafe break-away cables were a great way to keep MacBooks from getting damaged but Apple stopped using them as part of the transition to USB-C.  ThunderMag is a new accessory that replicates this feature.

Its inventor claims there’s no data or charging slowdowns, as have plagued earlier attempts to replace MacSafe.

Here’s what happens when you plug Thunderbolt gadgets into your 2018 iPad Pro

By

Thunderbolt iPad Pro 2018
The new iPad Pro can’t use Thunderbolt accessories, but it can recognize them.
Photo: Cult of Mac

Thunderbolt cables and plugs look exactly like USB-C cables and plugs, but they are incompatible. Or rather, you can plug both kinds into a Thunderbolt port and any connected peripheral will work, but you can’t plug Thunderbolt into USB-C. Or rather you can plug it in, but it won’t work. You see? We’re confused already.

But what happens when you plug a Thunderbolt accessory into the new 2018 iPad Pro?

MacBook smackdown: Which laptop is right for you?

By

MacBook Air 2018
Save on the newest MacBook Air today.
Photo: Apple

Apple finally dusted off the MacBook Air. The 2018 model sports a brand new design, a gorgeous Retina display, and powerful upgraded internals. All of sudden, Apple’s most affordable notebook is up there with its best.

In fact, the new ultraportable is so good, you would be crazy to buy a 12-inch MacBook right now. So, how does the new MacBook Air stack up against the rest of Apple’s laptop lineup? Which model best suits your needs, and which delivers the best bang for the buck?

Find out right here in our comprehensive MacBook comparison.

Why USB-C on the iPad would be a terrible idea [Opinion]

By

There’s no way I’m sticking that In my iPad’s hole.
There’s no way I’m sticking that In my iPad’s hole.
Photo: Charlie Sorrel/Cult of Mac

At this point, it seems that everyone is agreed that the next iPad will replace the excellent Lightning connector with an inferior USB-C connector. But I’m not so sure. Not only is the “evidence” for this huge change sketchy and speculative at best, but USB-C would bring almost no benefit to anyone — not users, and not Apple.

Clever Apple concept brings giant touchscreen keyboard to the iMac

By

The iMac finally gets a touchscreen.
The iMac finally gets a touchscreen.
Photo: Antonio De Rosa

Apple’s iMac lineup hasn’t seen any major design changes in years, but a clever new concept imagines some simple ways that Apple could bring some big innovations to its all-in-one PC. And we’re totally in love.

The Mac Touch concept created by Antonio De Rosa would transform the iMac into a powerful creation PC by adding a revolving and adjustable touchscreen. Video and photo editing, drawing, or even just surfing the internet would feel more magical on this iMac. It even brings back the hockey puck mouse with a new twist.

Take a closer look:

Apple may be working on 8K display for new Mac Pro

By

This may be the first and last display Apple makes with LG.
This may be the first and last display Apple makes with LG.
Photo: LG

It turns out Apple may not be finished making stand-alone displays for the Mac after all.

Apple partnered with LG to create a new 5K Thunderbolt 3 display last year to go with the new MacBook Pro, but according to a new report, the iPhone-maker is working on a new 8K display just for the next generation of Mac Pros.

Hackers can use this tiny $5 device to attack your locked Mac

By

PoisonTap is tiny but deadly.
PoisonTap is tiny but deadly.
Photo: Samy Kamkar

The next time you leave your Mac unattended, make sure to turn it off.

A well-known hacker has created a cheap tool that can steal data off of locked computers in minutes. The clever new device called PoisonTap is created using a $5 Raspberry Pi Zero and some open source code. Attackers can plug PoisonTap into a machine and as long as the victim has a web browser open, it can steal data and leave remote backdoors.