Blog

Many of the vulnerabilities relied on using iMessage to own the rest of the phone, Google’s Project Zero said. Source: Google Hackers Found 10 Ways to Hack an iPhone Without Touching It
Source: iFixit: Apple ‘Locking’ iPhone Batteries to Discourage Third-Party Replacements [Updated]
Apple is set for another privacy showdown with Facebook and VoIP apps. Source: iOS 13 privacy feature will force total overhaul for Facebook apps
Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to […] Source: With warshipping, hackers ship their exploits directly to their target’s mail room – TechCrunch
New report says flaw with common remote desktop access protocol left millions of users and researchers open to attack. Source: Vulnerability Exposed Microsoft Azure Users to Cyberattack