UNC0VER 6.0.0: The jailbreak tool for the latest iPhone models
The developers of “unc0ver” announced that the popular jailbreak tool will now be available for iOS 14.3 and earlier systems, so it can now be used for any available iPhoneRead More →
The developers of “unc0ver” announced that the popular jailbreak tool will now be available for iOS 14.3 and earlier systems, so it can now be used for any available iPhoneRead More →
A recent report by security firm Citizen Lab states that dozens of journalists were victims of an espionage campaign in which their mobile devices were compromised with a malware variantRead More →
Ian Beer, a researcher at Google Project Zero, has revealed some details about a dangerous iOS vulnerability that could put millions of iPhone users at risk. This flaw was fixedRead More →
The latest iPhone update includes the “warning point” feature, which will alert users every time an app activates your device’s microphone or camera. In other words, if any app triesRead More →
The development of a jailbreak for iOS systems has become one of the biggest ambitions of users of Apple devices. According to specialists in an ethical hacking course, Twitter userRead More →
Some time ago the tech company Grayshift gained notoriety thanks to its iPhone unlocking technology, used in a software called GrayKey. Specialists in a cyber security course mention that theRead More →
Just a few months ago, security testing course experts from Google’s Project Zero revealed some security vulnerabilities in Apple’s iOS operating system that could be exploited to completely compromise aRead More →
Despite parental surveillance, children are increasingly familiar with technology, information security awareness experts say. Apps like Facebook, YouTube and Internet search engines are very simple tools to use for anyRead More →
IT security services specialists reported the finding of a new flaw based on the use of special characters affecting Apple devices. The report, published on the MacRumors platform, mentions thatRead More →
Methods to compromise the security of mobile devices keep evolving. This time, vulnerability testing specialists at the University of Washington unveiled a new variant of smartphone attack based on theRead More →