18 Sep 2020

iOS 14 and iPadOS 14 Patch Vulnerabilities, Introduce New Privacy Features

This week, Apple patched roughly a dozen vulnerabilities and introduced new privacy features to accompany the rollout of iOS 14 and iPadOS 14. The addressed security flaws impact different operating system components such as Assets, Icons, AppleAVD, Sandbox, Siri, and WebKit. The flaws could result in several different occurrences, such

Read More
04 Nov 2019

Hackers Claim ‘Any’ Smartphone Fingerprint Lock Can Be Broken In 20 Minutes

Security researchers with Tencent’s X-Lab have found a way to use photographs of fingerprints in order to beat the fingerprint scanner on virtually all Android phones as well as iPhone 8 and older iPhone devices. Moreover, a demonstration of the technique at the GeekPwn 2019 conference in Shanghai showed that

Read More
09 Sep 2019

Apple: Security Report on iPhone Hack Created ‘False Impression’

Apple on Friday slammed a recent Google report claiming that threat actors may have hacked into thousands of iPhones via an “indiscriminate” years-long campaign involving a number of malicious websites. According to Google, merely visiting one of the websites could have resulted in device exploitation along five different attack chains

Read More
09 Aug 2019

Hackers Can Break Into an iPhone Just by Sending a Text

iPhone users could have their device compromised by attackers just by receiving a malicious iMessage, research by Google Project Zero shows. The attack is possible because Apple’s iOS iMessage client contains what the researchers refer to as “interaction-less” vulnerabilities that can be exploited without any involvement of the user. According

Read More
23 May 2019

All iPhones And Some Android Phones Are Vulnerable To A New Device Fingerprinting Attack

Cambridge University researchers have discovered a new kind of “fingerprinting attack” that could enable websites to keep track of individual users as they visit other websites using the same browser. Fingerprinting is a nightmare for people who care about their privacy. It can be used to target people with customized

Read More