- The WicKed Web Weekly
- Posts
- Apple Watch Series 9 & Ultra 2 Face ITC Ban
Apple Watch Series 9 & Ultra 2 Face ITC Ban
We're kicking off with Apple's latest wrist-wear woe, where patent pitfalls threaten to yank the Apple Watch Series 9 and Ultra 2 off the U.S. market faster tha
We're kicking off with Apple's latest wrist-wear woe, where patent pitfalls threaten to yank the Apple Watch Series 9 and Ultra 2 off the U.S. market faster than you can say "time's up!" Then, we dive into the quirky realm of AI image generators, where "data poisoning" is turning simple requests into digital dilemmas – think of asking for a balloon and getting an egg!
And finally, we wrap up with a cyber-security clarion call from CISA, urging a goodbye to those pesky default passwords. It's a world where forgetting to change 'admin123' can open the floodgates to a cyber onslaught.
So, grab your cup, and let's decode the digital domain where every byte and pixel tells a story. Cheers to a day filled with innovation, intrigue, and a dash of internet insanity! 🌐💻🚀

Apple Watch Series 9 & Ultra 2 Face ITC Ban
Tick-tock, the clock is ticking for Apple's latest smartwatches. The Apple Watch Series 9 and Ultra 2 models are slated to disappear from U.S. shelves post-3PM ET on December 21st, with a final pickup and delivery deadline of December 24th. This abrupt halt in sales is Apple's way of complying with an upcoming International Trade Commission (ITC) import ban, a repercussion of their ongoing patent skirmish with medical tech giant Masimo.
Patent Spat Spells Trouble
The heart of the dispute? A patented SpO2 sensor. While the budget-friendly Apple Watch SE remains unaffected thanks to its lack of this sensor, the flagship Series 9 and Ultra 2 are directly in the crosshairs. Interestingly, previous Apple Watch models sporting the SpO2 sensor aren't impacted either. As for international Apple fans, the ban doesn't reach beyond U.S. borders.
Apple, not one to back down, has expressed strong disagreement with the ITC's decision and is actively exploring legal and technical avenues to keep its latest watches within customers' reach.
A Glimmer of Hope? The ban's fate is not sealed yet. It's currently under presidential review, with President Biden holding the power to veto. Although vetoes are rare, Apple has seen such reprieves before, like in 2013 under President Obama. However, Biden's track record includes upholding a similar ban regarding Apple's EKG feature. The decision deadline? December 25th.
Apple's Next Move: If the ban persists, expect Apple to counterattack with an appeal in the Federal Circuit. Their spokesperson, Nikki Rothberg, assures they'll do whatever it takes to bring the Series 9 and Ultra 2 back to U.S. customers ASAP.
🔍 Stay tuned: The outcome of this corporate drama could set a precedent for future tech-patent clashes.

AI Image Generators: The Poisoning Dilemma
In a digital twist, AI image generators like Midjourney or DALL-E are facing a peculiar challenge: "data poisoning." You might ask for a red balloon, but get an egg instead. Why? It's all about the training data these models consume.
The Heart of the Problem
These generators learn from massive datasets, often scraped from the internet. This indiscriminate approach has sparked copyright battles, as artists accuse tech giants of using their work without permission. Enter "Nightshade," a tool designed to empower artists. It subtly tweaks image pixels, imperceptible to humans but disruptive to AI, leading to the AI misclassifying images – hence the unexpected results.
The Ripple Effect
The more "poisoned" images in the data, the bigger the disruption. This can reintroduce past AI flaws, like misrendered hands, or create bizarre outputs like six-legged dogs. Crucially, one poisoned image can taint related terms across the board.
Countering the Chaos: To combat this, developers are turning to varied solutions:
Careful Data Curation: Paying attention to the origins and usage rights of training data to reduce indiscriminate harvesting.
Ensemble Modeling: Using multiple models to compare and weed out outliers.
Audits: Implementing a "test battery" of well-labeled, non-training data to check model accuracy.
Beyond Tech Fixes
Data poisoning isn't just a technical snag; it's part of broader "adversarial approaches" against AI systems. From activists using makeup to evade facial recognition to concerns over mass surveillance, it's a pushback against technological intrusion. Some see data poisoning not just as a problem, but as a creative response defending artists' and users' rights.
🔍 Bigger Picture: This isn't just about fixing a tech issue, but about rethinking our approach to AI and its impact on individual rights and creative expression.

CISA's Call to Eliminate Default Passwords
In a world where cyber threats lurk at every corner, CISA (Cybersecurity and Infrastructure Security Agency) is sounding the alarm: Ditch those default passwords on internet-exposed systems, pronto! This stern warning comes amid growing concerns about cyber attacks on critical infrastructure in the U.S., particularly those perpetrated by Iranian threat actors affiliated with the Islamic Revolutionary Guard Corps (IRGC).
The Peril of Predictability
Default passwords are like an open invitation to cybercriminals. These pre-set, widely known credentials are a common feature in various devices and systems. They make it easy for malicious actors to gain root or administrative privileges, leading to potentially devastating breaches.
Recent Alarming Incidents
Just this month, CISA revealed IRGC-affiliated cyber actors, using the guise of Cyber Av3ngers, targeted Israeli-made Unitronics Vision Series PLCs (Programmable Logic Controllers) exposed online. Their tool of choice? The good old "1111" default password.
Mitigation is Key: CISA is urging manufacturers to adopt "secure by design" principles. This includes providing unique setup passwords, disabling defaults after a certain period, and pushing for phishing-resistant multi-factor authentication (MFA).
Beyond the Tech Fix
CISA suggests manufacturers should conduct field tests to understand customer usage of their products and ensure the easiest way to operate these devices is also the most secure one.
A Broader Cybersecurity Landscape
These developments are part of a larger narrative. The Israel National Cyber Directorate (INCD) has linked a Lebanese threat actor, connected to the Iranian Ministry of Intelligence, to attacks on its critical infrastructure. Meanwhile, CISA has released guidelines for healthcare and critical infrastructure entities to beef up their cyber defenses.
Takeaways for Organizations:
Strong, unique passwords and phishing-resistant MFA.
Run only essential ports, protocols, and services.
Limit service account permissions.
Regular patch management and network segregation controls.
Encrypt sensitive data and cease using outdated hardware and software.
🔒 The Bottom Line: In the digital age, cybersecurity is not just about sophisticated software; it's about basic practices like eliminating default passwords to fortify defenses against evolving cyber threats.