Skip to main content

Remove Apple iPad virus warning popups

Learn the details of the Apple iPad virus warning scam and get effective methods to prevent these deceptive alerts from popping up in web browsers on iPad.

David Balaban
David Balaban

iOS 10.3 update stops Safari ransomware campaign in its tracks

Find out what new feature in iOS 10.3 addresses an aggressive scareware campaign that wreaked havoc with Safari Mobile in pursuit of a fee for unblocking it.

John Dee
John Dee

Helpappledevice@gmail.com virus: How to unlock infected iPhone or iPad

Learn how to easily unlock iPhone or iPad hit by the helpappledevice@gmail.com mobile ransomware that tries to dupe victims into submitting $50 as a ransom.

David Balaban
David Balaban

Remove mobfree.click redirect virus from iPhone and iPad

Find out how to prevent Safari and Chrome on iPhone, iPad and iPod Touch from being redirected to mobfree.click site that pushes unwanted app downloads.

David Balaban
David Balaban

Remove FBI virus on iPhone

This post covers the methodology to remove the fake FBI alert on iPhone and provides helpful recommendations on preventing cyberattacks of this kind.

John Dee
John Dee

Remove XcodeGhost malware (Xcode Ghost) from infected iOS device

Learn the ins and outs of the XcodeGhost attack targeting iOS users via infected applications, and evade the privacy risks that may emanate from this hoax.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 5 - Problems and Fixes

The final part of the presentation covers the problems that may prevent the Mactans attack from getting through and the applicable workarounds for those.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans Attack

Yeongjin Jang and Billy Lau now provide a demo of how the actual Mactans charger can be used to pull off an attack on an iOS device.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App

Yeongjin Jang provides further insight into the Mactans attack by describing provisioning profile obtaining process and installing a hidden app onto iOS device.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 2 - Overview of the Mactans Attack

Billy Lau and Yeongjin Jang continue their Black Hat talk with describing the Mactans attack proper, including the charger’s properties and the attack phases.

John Dee
John Dee