iphone

  1. Father

    What happens if you install 100 apps on your iPhone and leave them on for five days

    A new Cybernews experiment clearly demonstrates that even Apple smartphones are not without the problem of excessive data exchange. A new study conducted by Cybernews experts showed that the iPhone continues to actively exchange data with external servers, even when it is in idle mode for a...
  2. Father

    South Korea refuses iPhone: the country's army bans smartphones

    The Air Force fears for national security due to Apple's strict policy. The South Korean armed forces plan to introduce a complete ban on the use of iPhones in military institutions. The main reason for such measures is the risk of leakage of confidential information through voice recordings...
  3. Father

    Disable iMessage immediately: A $2 million exploit gives you control of the iPhone without a single click

    Trust Wallet under fire for reporting iMessage vulnerability. Trust Wallet has called on Apple users to disable iMessage because of information about a critical zero-day vulnerability that allows hackers to seize control of smartphones. According to Trust Wallet, the vulnerability allows an...
  4. Father

    Шпионское ПО LightSpy iOS с китайской привязкой нацелено на южноазиатских пользователей iPhone

    Исследователи кибербезопасности обнаружили "возобновленную" кампанию кибершпионажа, нацеленную на пользователей в Южной Азии с целью внедрения шпионского ПО Apple iOS под названием LightSpy. "Последняя версия LightSpy, получившая название "F_Warehouse", может похвастаться модульной структурой с...
  5. Father

    iPhone for $7 million: prices for vulnerabilities break records

    Increased security leads to higher prices for exploits. In recent years, the cost of hacking tools for smartphones, popular browsers and instant messengers has increased significantly. Currently, exploits are estimated at millions of dollars, which is due to the increasing complexity of hacking...
  6. Father

    The Kejriwal case: India asks for Apple's help in unlocking iPhone

    Whether the company's decision will affect the disclosure of the money laundering case. As part of an ongoing investigation involving the Chief Minister of the Indian city of Delhi, Arvind Kejriwal, employees of the Executive Directorate of India (Directorate of Enforcement, ED), which...
  7. Teacher

    MFA Bombing: how a bombardment of notifications causes data to be deleted from the iPhone

    An avalanche of notifications is a harbinger of a phishing attack. Apple users have encountered a clever phishing scheme that exploits a vulnerability in the password reset function. Victims of the attack find that their devices receive such a large number of system notifications that the...
  8. Teacher

    Escalation of the global conflict may lead to the blocking of iPhone and Android devices in the Russian Federation

    Anton Gorelkin shared his thoughts on the future of the Internet and technology. Deputy Chairman of the State Duma Committee on Information Policy Anton Gorelkin shared his assumptions about possible steps taken by leading technology companies in the event of a further escalation of the...
  9. Teacher

    WhatsApp has suddenly issued an emergency alert for all iPhone and Android users

    The new feature raises questions about the future of privacy. On the cusp of one of the biggest updates in recent years, WhatsApp is sounding the alarm, warning 2 billion users worldwide of a serious security threat and urging them to exercise caution. The popular messenger service is facing an...
  10. Teacher

    iPhone again under 0day-sight: Apple hastily closes holes in iOS

    Upgrade your devices to avoid becoming another victim of hackers. Apple has released emergency security updates to address two zero-day vulnerabilities in iOS that have already been exploited in real attacks on the iPhone. The company announced this on March 5 in a separate security...
  11. Teacher

    RCS on iPhone: who won and who lost?

    Insiders revealed the true reason why Apple took the path of unification. Recently, it became known that Apple implement the RCS protocol in the standard Messages app was caused not by international pressure or criticism from Google, but by new Chinese regulatory requirements . It turns out...
  12. Teacher

    GoldPickaxe Trojan Steals iPhone Owners Faces to Access Bank Accounts

    Biometrics has become a truly valuable resource for cybercriminals. Cybercriminals have begun attacking iPhone owners with malware that steals 3D scans of individuals for unauthorized access to bank accounts. This became known from a study of the company Group-IB, which deals with...
  13. Teacher

    Шпионская программа Pegasus нацелилась на iPhone журналистов и активистов в Иордании

    Согласно совместным выводам Access Now и Citizen Lab, iPhone, принадлежащие почти трем десяткам журналистов, активистов, адвокатов по правам человека и членов гражданского общества в Иордании, были нацелены на шпионское ПО Pegasus от NSO Group. Было публично подтверждено, что целью были девять...
  14. Brother

    Apple defeated NSO Group: the court supported the corporation in the case of iPhone spyware infection

    Is the NSO Group to blame for developing a covert surveillance exploit? A US court has rejected a motion by the Israeli company NSO Group, developer of the Pegasus spyware software, to dismiss a lawsuit filed by Apple. The corporation accuses NSO of violating laws on computer fraud and other...
  15. Brother

    Apple выпустила исправление для критического нулевого дня в iPhone, Mac - обновить сейчас

    Apple в понедельник выпустила обновления для системы безопасности для iOS, iPadOS, macOS, tvOS и веб-браузера Safari, чтобы устранить недостаток "нулевого дня", который активно используется в дикой природе. Проблема, отслеживаемая как CVE-2024-23222, представляет собой ошибку путаницы типов в...
  16. Brother

    Самый изощренный взлом iPhone, когда-либо использовавший скрытую аппаратную функцию Apple

    В шпионских атаках Operation Triangulation, нацеленных на устройства Apple iOS, использовались невиданные ранее эксплойты, которые позволяли обходить даже основные аппаратные средства защиты, установленные компанией. Российская компания по кибербезопасности Kaspersky, которая обнаружила...
  17. Brother

    "Reverse Triangulation": mysterious vulnerability in the iPhone remains unsolved

    The company is close to understanding all aspects of the attack, but one vulnerability raises many questions. In early summer, Kaspersky Lab experts discovered a large-scale cyber operation aimed at infecting the iPhone of Russian users. This operation is called "Operation Triangulation"...
  18. Brother

    Hackers hack iPhone through keyloggers in virtual keyboard

    What you need to know about protecting your device. Recently, it was discovered that hackers found a way to bypass the iPhone's security systems using third-party keyboards. According to a report by Russell Kent-Payne of Certo Software, attackers use these keyboards to record personal messages...
  19. Lord777

    How to make a hacker iPhone or iPad (Pentest on iOS)

    Content 1 How to make a hacker iPhone or iPad 1.1 iOS Jailbreak 1.2 Cydia 1.3 MobSF 1.4 Frida 1.5 Objection 1.6 Runtime Mobile Security (RMS) 1.7 Grapefruit 2 Conclusion We told you how to make a hacker smartphone using Termux and Kali Linux. That article was about Android. Today I'll show...
  20. Lord777

    Apple is looking for IT engineers to crack the iPhone 15s

    What is the main feature of the new model and why is it so important to make sure that it is safe? Apple hires IT engineers who can crack the latest iPhone 15s smartphone. The goal is to identify vulnerabilities and possible threats that need to be addressed before mass sales start. The new...
Top