Update your iOS now! Apple patches three zero-day vulnerabilities
Apple has issued an update for iOS and IPadOS to patch three zero-day vulnerabilities that were being exploited in targeted attacks. We advise you to install it at ASAP.
Apple’s notarization process fails to protect
Apple introduced the concept of notarization to ensure any new software submitted to the App Store is malware-free. But is it all for show?
iOS Mail bug allows remote zero-click attacks
A newly-discovered vulnerability in iOS Mail can be used to attack an iPhone remotely using a malicious e-mail message, even if you’re running the latest version of iOS (13.4.1).
Malwarebytes Labs releases 2020 State of Malware Report
The 2020 State of Malware Report reveals how cybercriminals upped the ante on businesses, Mac threats outpaced PCs, and ransomware continued its targeted, deadly assault with new families in 2019. Learn all this and more in the full report, linked in our blog.
The little-known ways mobile device sensors can be exploited by cybercriminals
Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.
New iOS exploit checkm8 allows permanent compromise of iPhones
A new exploit for iOS enables attackers to gain permanent access to iPhones, iPads, Apple Watches, and more—with zero potential for patching. Learn why this is possibly the biggest security news for iOS since its inception.
300 shades of gray: a look into free mobile VPN apps
Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of them are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.
Unprecedented new iPhone malware discovered
Google announced late last night that hacked websites have been used to drop iPhone malware on unsuspecting users over a two-year period. Thomas Reed investigates.
Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks
Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?
Data and device security for domestic abuse survivors
Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.