Apple’s search for child abuse imagery raises serious privacy questions

iMessage content, and photos sent to iCloud are going to be monitored for child sexual abuse material. Is it a great move, or a dangerous slide away from privacy?

Read more

How one word can disable an iPhone’s WiFi functionality

A researcher has found a way to disable the WiFi functionality on iPhones by getting them to join a WiFi hotspot with a weird name. This shouldn’t be happening.

Read more

A week in security (June 14 – June 20)

A roundup of the most interesting events and happenings in the realm of infosec, from the week June 14 to June 20.

Read more

Research claims Google Pixel phones share 20 times more data than iPhones

Researchers have tested the amount of telemetry data that Android and iPhone handhelds send home. The results may surprise you.

Read more

The one reason your iPhone needs a VPN

If there’s one reason users need to use a VPN with their iPhones, it’s this: A VPN can protect you where Apple cannot.

Read more

How your iPhone could tell you if you’re being stalked

The latest Apple iOS beta suggests that iPhone users will be warned about hidden tracking devices in the future, but questions remain.

Read more

The Malwarebytes 2021 State of Malware report: Lock and Code S02E04

This week on Lock and Code, we discuss the top security headlines and talk to Adam Kujawa about the 2021 State of Malware report.

Read more

iPhone app exposed other people’s call recordings

We look at work by a researcher who discovered that records made on your phone could have been downloaded by anyone.

Read more

Apple’s notarization process fails to protect

Apple introduced the concept of notarization to ensure any new software submitted to the App Store is malware-free. But is it all for show?

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Read more

Select your language