TriangleDB: the spyware implant of Operation Triangulation
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
62 articles
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
If you use an iPhone, it’s crucial to always install the Safari and WebKit updates, even if your browser of choice is Chrome, Firefox or something else. Here’s why.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
How to set app permissions in iOS 15 for maximum privacy and security.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
No one is immune to smartphone theft, but you can make sure no thief will get even a byte of your important data.
How to stop your iPhone or iPad from distracting you with endless notifications.
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
Using simple tools such as lasers and music to trick voice assistants and motion sensors.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?