Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.
Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.
GrayKey, an iPhone unlocker, is secretly being marketed to law enforcement. Thanks to an anonymous source, we now know how the device works—and the danger it presents to security.
A malvertising campaign on iOS is pushing a scareware page tricking Apple users into installing a free VPN app that comes with serious privacy implications.
According to a report from Motherboard, a group of hackers calling themselves “Turkish Crime Family” is threatening to remotely erase devices belonging to hundreds of millions of Apple customers. They will do this on April 7, they say, if Apple doesn’t pay them a ransom.
On Valentine’s Day, Mac users got a special “treat” in the form of new malware. Now, weeks later, there are signs of yet another piece of malware looming. This brings the count of malware (as opposed to adware or other threats) discovered for macOS this year up to 4, in only two short months.
Update (12/13/2016): Apple has added a Report Junk link on iCloud.com, to allow you to report these spam events as junk. Use this feature to remove the events at this point. It is a good bet that Apple will add a similar option to the Calendar app on macOS and iOS in a future update….
We take a look at an iOS app which claims to be an “exclusive” release of the recently released console and PC RPG Fallout 4.