Predator vs. iPhone: the art of invisible surveillance
Intellexa’s Predator spyware can hide camera and microphone usage indicators on iOS devices. Here’s a look at how it pulls it off.
72 articles
Intellexa’s Predator spyware can hide camera and microphone usage indicators on iOS devices. Here’s a look at how it pulls it off.
Tired of hallucinations in AI overviews, and have no clue as to why or how Copilot suddenly appeared on your PC? Here’s a guide to switching off those intrusive AI features in popular services.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Adjust your daily routines to leave as little data about yourself online as possible.
This marks the second time we’ve found a stealer Trojan in the App Store.
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
We break down the most covert mechanism of smartphone surveillance using real-life examples.
The updated VPN & Antivirus by Kaspersky for iOS now supports Apple Shortcuts and Siri. We explain what you can do with this feature, and how to set it up.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
If you use an iPhone, it’s crucial to always install the Safari and WebKit updates, even if your browser of choice is Chrome, Firefox or something else. Here’s why.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
How to set app permissions in iOS 15 for maximum privacy and security.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.