What are passkeys? How Mac and iPhone are ready for the future of security
The reliance on the traditional password-centric era is decreasing, as companies shift toward more secure alternatives. In 2022, as pioneers in both user experience and security, Apple embraced a new authentication method, called passkeys.
GoldPickaxe - the first iOS trojan unleashed
This write-up sheds light on groundbreaking malware called GoldPickaxe that targets iOS devices and gets hold of users’ biometric data to access bank accounts.
Yubo’s Voice Messages feature enhances user functionality
The live social discovery app Yubo has upgraded its chat feature to provide users with new voice message functionality.
Exploring Apple’s potential in the AI business race
Looking at the current advances in generative AI from Microsoft, OpenAI, and Google, here are 5 possible ways Apple will enter the AI business race.
5 security tips to keep your iPhone safe from privacy threats in 2023
Considering how integral phones are to our everyday lives, few people actively take the initiative to secure their pocket devices.
CVMServer exploit for macOS/iOS
Security researchers at Trend Micro shared details about a new privilege escalation flaw affecting CVMServer on macOS Big Sur, iOS, and iPadOS.
XXI century cybercrime stats and what to expect in the 2020s
Get insights into the noteworthy cybercrime statistics for the XXI century and find out how the global threat landscape will change in the 2020s.
Apple patches an actively exploited UXSS bug in iOS, iPadOS, and watchOS
Operating systems running on Apple mobile devices and wearables have been updated to address a security gap that may have been used in real-world attacks.
Apple fixes an arbitrary code execution flaw in Safari
In a series of updates tailor-made for its different platforms, Apple has rolled out important security fixes that address a serious Safari vulnerability.
Side effects of Apple’s security philosophy
The rigid control of software and hardware in Apple devices is both an obstacle to exploitation and a way for high-profile threat actors to persevere inside.