#iOSSecurity

2025-06-12

A single iMessage might now compromise your iPhone—no clicks needed. Graphite spyware is targeting journalists worldwide and raising serious questions about our digital safety. Curious to learn more?

thedefendopsdiaries.com/graphi

#graphitespyware
#zeroclickexploit
#iossecurity
#cyberthreats
#journalistprotection

Pen Test PartnersPTP@infosec.exchange
2025-05-28

Installing unsigned or fake-signed iOS apps for testing without a Mac, Xcode, or access to proper signing tools can be a challenge.

Since iOS normally relies on the App Store to handle signing, getting apps onto a device manually isn’t always straightforward.

In our latest blog, we break down the main approaches to sideloading using tweaks on jailbroken devices, sideloading platforms like AltStore and Sideloadly, and on-device tools like TrollStore.

Whether your device is jailbroken or not, you’ll find a method that works.

📌Read here: pentestpartners.com/security-b

#iOSSecurity #MobileAppTesting #Sideloading #CyberSecurity #infosec

PUPUWEB Blogpupuweb
2025-02-21

🚨 iVerify's iOS app detected 11 new Pegasus infections in December 2024! 🦠 Shockingly, about half of the affected devices didn’t receive Threat Notifications from Apple. A major security concern! 🔐

posivi.com/iverifys-ios-app-de

🚨 iVerify's iOS app detected 11 new Pegasus infections in December 2024! 🦠 Shockingly, about half of the affected devices didn’t receive Threat Notifications from Apple. A major security concern! 🔐 #iOSSecurity #PegasusSpyware #Apple #TechNews #Privacy
2024-12-12

I always find these kinds of posts fascinating and can usually pick up a glimpse of iOS design from them. In this case, the article talks a lot about the Secure Enclave and how it interacts with other parts of the phone. I also appreciate the before first unlock / after first unlock call outs.

#ios #security #iossecurity #blogposts #iphone naehrdine.blogspot.com/2024/11

Technoholic.metechnoholic
2024-04-29

iOS 18 update brings cutting-edge AI security features to iPhones, enhancing user protection. us.technoholic.me/ya9ExWa

2024-04-20
Alex Dikerdiker@mstdn.ca
2023-12-30

Operation Triangulation’ #Spyware Attackers Bypass #iPhone Memory Protections...iMessage attachment, exploiting the remote code execution (#RCE) #vulnerability CVE-2023-41990.

#apple #cybersecurity #technology #news #iPhones #ios #iossecurity

Source🔗
darkreading.com/application-se

dnsdns
2023-04-30

Develop your own zero day vulnerabilities in iOS : faisalmemon.github.io/the-road

Birdflybirdfly
2022-05-31

RT @mobilesecurity_: A Deep Dive into iOS Code Signing
by @umanghere
t.co/L9Zgj4WUyV

Ludovic Dubostldubost@framapiaf.org
2020-05-10

RT @mobilesecurity_@twitter.com

A technical deep-dive into the NHS COVID-19 contact tracing app
#MobileSecurity #iOSsecurity by @reincubate@twitter.com
reincubate.com/blog/nhs-covid-

🐦🔗: twitter.com/mobilesecurity_/st

2020-03-16
@:

Popular iPhone and iPad Apps Reportedly 'Snooping' on Pasteboard Data

According to new research by Talal Haj Bakry and Tommy Mysk, dozens of popular iOS apps are reading the contents of the pasteboard without user consent, which could include sensitive information.

The investigation discovered that many popular apps, such as TikTok, 8 Ball Pool™, and Hotels.com, quietly read any text found in the pasteboard every time the app is opened.

iOS and iPadOS apps have unrestricted access to the system-wide pasteboard, also known as the clipboard, as of iOS 13.3.

Text left in the pasteboard may be inconsequential, but it could also be highly sensitive data such as passwords or financial information. The potential security risks of this vulnerability have previously been investigated by Bakry and Mysk, where they found that precise location information was leaking through the system pasteboard.

A diverse range of apps, from popular games and social networking apps, to news apps of major news organizations such as Fox News or The Wall Street Journal, were examined using standard Apple development tools. Many of these apps do not provide any UI that manages text, yet they read the text content of the pasteboard every time they are opened.

It is also of note that if Universal Clipboard is enabled, an app may also access whatever has been copied on a Mac.

What exactly these apps do with the contents of the pasteboard once they have read it is unknown.

Tag: iOS 13

This article, "Popular iPhone and iPad Apps Reportedly 'Snooping' on Pasteboard Data" first appeared on MacRumors.com

Discuss this article in our forums

feeds.macrumors.com/~ff/MacRum… feeds.macrumors.com/~ff/MacRum… feeds.macrumors.com/~ff/MacRum…

#iOS #apps #ITSecurity #iOSSecurity #MacRumors #TalalHajBakry #TommyMysk #pasteboard
#tiktok #NYTimes #NPR #Reuters #RussiaToday #PUBG #PlantsVsZombies #AccuWeather #AliExpress #Hotels.com #HotelTonight
2017-12-13

#MacSecurity #iOSSecurity #KRACK

Apple released:
• AirPort Firmware Update 7.6.9 for AirPort Express/Extreme & Time Capsule 802.11n
• AirPort Firmware Update 7.7.9 for AirPort Extreme & Time Capsule 802.11ac

Both of whoich are fixing WPA2/KRACK!

support.apple.com/en-us/HT2082

support.apple.com/en-us/HT2083

Update your AirPort Base Stations and Time Capsules NOW!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst