iPhone

iPhone Privacy ‘Lies’ Exposed Again: Apple Analytics not Anonymous
Apple has been caught lying in a privacy policy. So say the now-notorious security researchers at Mysk ...

Lockdown Mode: Apple to protect users from targeted spyware attacks
Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies. “Lockdown Mode” is scheduled to arrive ...

DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee ...

NSO Group Spied on European Union—on French Orders?
An espionage attempt was made by an NSO Group customer to hack the phones of senior EU officials ...
Faking an iPhone Reboot
Researchers have figured how how to intercept and fake an iPhone reboot: We’ll dissect the iOS system and show how it’s possible to alter a shutdown event, tricking a user that got ...

FluBot malware warning after 70,000 attacks launched over SMS
Finland’s National Cyber Security Centre (NCSC-FI) has issued a warning about malicious SMS messages that have been spammed out to mobile users, directing iPhone owners to phishing sites and Android users to ...

The Coming Mac Threat (Revisited)
How we viewed security for the Mac in 2008. This is a republished article from MacUser magazine. In The Coming Mac Threat (Revisited) we look at how experts perceived security for the ...

How Hidden Vulnerabilities will Lead to Mobile Device Compromises
Your mobile device can be hacked very easily without your knowledge. Even if an attacker can’t get into your device they can attempt to gain access to the sensitive information instead that ...

Jailbreak or Jail – Is Hacking for the Government A Crime?
After the horrific shooting in San Bernardino, California, federal law enforcement officers seized the now-dead suspect’s iPhone, and sought to examine it. However, the phone was “locked” using proprietary hardware and software ...
Details on the Unlocking of the San Bernardino Terrorist’s iPhone
The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company called Cellebrite. It was ...