UNC0VER 6.0.0: The jailbreak tool for the latest iPhone models
The developers of “unc0ver” announced that the popular jailbreak tool will now be available for iOS 14.3 and earlier systems, so it can now be used for any available iPhoneRead More →
The developers of “unc0ver” announced that the popular jailbreak tool will now be available for iOS 14.3 and earlier systems, so it can now be used for any available iPhoneRead More →
Cybersecurity specialists reported the detection of a new malware campaign specially designed to infect Mac devices, accumulating nearly 30,000 successful infections by the time now. This new variant, dubbed “SilverRead More →
Patrik Wardle, a renowned information security researcher, reported the finding of one of the first malware variants specifically designed to compromise the latest generation Apple devices using the M1 chip,Read More →
Cybersecurity specialists detected a critical buffer overflow vulnerability affecting Linux SUDO that could also affect the latest version of Apple macOS Big Sur; this flaw has not yet been correctedRead More →
A few years ago, the emerging company Grayshift broke into the mobile security market with the launch of GrayKey, a tool capable of unlocking almost any model of iPhone thatRead More →
A British security specialist reported finding a critical vulnerability in Shazam, the popular music recognition app, which would allow threat actors to extract a user’s location data by sending aRead More →
A recent report by security firm Citizen Lab states that dozens of journalists were victims of an espionage campaign in which their mobile devices were compromised with a malware variantRead More →
Ian Beer, a researcher at Google Project Zero, has revealed some details about a dangerous iOS vulnerability that could put millions of iPhone users at risk. This flaw was fixedRead More →
A group of specialists has found a way to jailbreak HomePod, Apple’s smart speaker that can only be linked to the iDevices product family. Thanks to this method, developed byRead More →
Apple‘s security teams announced the fix for three zero-day vulnerabilities in the iOS system, which have been actively exploited and affect iPhone, iPad, and iPod devices: “We are aware ofRead More →
The latest iPhone update includes the “warning point” feature, which will alert users every time an app activates your device’s microphone or camera. In other words, if any app triesRead More →
The development of a jailbreak for iOS systems has become one of the biggest ambitions of users of Apple devices. According to specialists in an ethical hacking course, Twitter userRead More →
Security has become the main focus of marketing campaigns for Apple devices, although we should not forget that any product is completely safe from some threats, as mentioned by iOSRead More →
Xu Hao, information security awareness researcher from Team Pangu, has revealed the finding of an “uncorrectable” vulnerability on the Secure Enclave Processor (SEP) chip. The flaw, identified as “Attack SecureRead More →
Although Apple devices are sold as a safer option than their Android OS counterparts, iOS products are not safe from security flaws. Recently, a network perimeter security expert discovered thatRead More →
The launching of Apple’s Bug Bounty Program allowed the cybersecurity community to work together with the giant tech company to fix multiple security flaws that could have compromised users ofRead More →
Apple has just introduced iOS 14, in addition to iPadOS 14, also announcing the release of the beta so developers can test new features and prepare their apps for whenRead More →
Virtual private networks (VPN) are the main alternative for users to browse the Internet with complete privacy, although like any other technological development, these can present flaws, mention experts fromRead More →
Protests after the George Floyd case have led to multiple demonstrations, which some people have taken advantage of to commit looting in small businesses and department stores, with Apple storesRead More →
A new privacy scandal looms for Apple, thanks to Thomas Ie Bonniec, a former contractor for the company who revealed how the company collected millions of samples of queries toRead More →