Apple Adds PQ3 post-quantum Encryption for iMessage
Apple has released its new PQ3 (post-quantum) cryptographic protocol, claimed to be the first-ever messaging protocol to reach Level 3 security.
Apple announced its cryptographic protocol change in 2019 when it shifted from RSA to...
Apple Critical Zero-day Flaw Exposes iPhones & Macs
Apple has released its first zero-day vulnerability patch of 2024, which affected several Apple products, including tvOS, iOS, iPadOS, macOS, and Safari. The zero-day is tracked under the CVE ID CVE-2024-23222, and the severity...
Beware! Hackers Attacking Thousands of Users With Fake iCloud Storage Alert
Since Apple iCloud saves sensitive and personal data like images, emails, and documents, hackers often target Apple iCloud.
Breaching iCloud grants hackers access to sensitive information, allowing them to abuse or sell the data for...
New iShutdown Scripts Enable Detection of Spyware On iPhones
Malware hunting on iOS devices has been extremely difficult due to the nature of the iOS ecosystem.
There were only two methods for conducting forensic investigations on iOS devices: either to examine an encrypted...
LeftoverLocals Attack Let Attackers Steal AI Data From Apple, Qualcomm & AMD GPUs
An attacker may be able to steal a significant amount of data from a GPU's memory due to a flaw known as LeftoverLocals that affects several popular GPU brands and models, including AMD, Apple, and...
Apple Urgently Patches Zero-day Flaw Exploited in the Wild
Apple has released an emergency security update for patching two actively exploited zero-day vulnerabilities on iOS. The vulnerabilities were discovered earlier this month and are tracked as CVE-2023-42916, and CVE-2023-42917 affected many Apple products.
The...
iLeakage – New Attack Let Hackers Steal Emails, Passwords On Apple Safari
Browser-based timerless speculative execution attacks are a security threat that exploits vulnerabilities in web browsers and CPUs.
These attacks do not rely on timing measurements, making them harder to detect.
Their sophistication varies, but they can...
iPhone Zero-Click, Zero-Day Flaw Exploited in the Wild to Install Malware
Researchers discovered an actively exploited zero-click vulnerability that was part of an exploit chain aimed at deploying NSO Group's Pegasus malware.
One of the most potent tools now on the market is Pegasus, which is...
Apple Opens Application for Security Research Device Program
Apple launched the Security Research Device (SRD) program, enabling security researchers to examine the security features of a specially-built hardware variant of the iPhone 14 Pro.
Apple Security Bounty is also available for security flaws...
Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones, Macs, and iPads
Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads that seriously affect the digital security of Apple devices.
The company claims to be aware...