Skip to content
securitysifu

SecuritySifu

CyberSecurity And Emerging Technology
securitysifu
  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds

Tag: iphone

King iPhone Hacker NSO Group Robbed By Employee -- Spyware On Dark Web Sale For $50 Million, Israel Claims
DarkNet Security

King iPhone Hacker NSO Group Robbed By Employee — Spyware On Dark Web Sale For $50 Million, Israel Claims

21/12/2020 No Comments appleiosiphonemalwarespywaresurveillance

As well as becoming something of a bête noire of privacy and human rights activists, Israel’s NSO Group has established itself as one of the…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More King iPhone Hacker NSO Group Robbed By Employee — Spyware On Dark Web Sale For $50 Million, Israel Claims
New Class Of SQLite Exploits Open Door To iPhone Hack
Mobile Security

New Class Of SQLite Exploits Open Door To iPhone Hack

16/09/2020 No Comments appledatabaseiosiphonepatchsqlitevulnerability

Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context of a browser for the first time. The new…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More New Class Of SQLite Exploits Open Door To iPhone Hack
Fake PornHub And Google Android Apps Are Actually ‘Russian Spy Tools’
Mobile Security

Fake PornHub And Google Android Apps Are Actually ‘Russian Spy Tools’

16/08/2020 No Comments androidapplegoogleintelligenceiphonerussiaspy

Android spyware allegedly created by one of the Russian government’s go-to surveillance providers has been discovered. And it’s hiding in fake apps that look just…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Fake PornHub And Google Android Apps Are Actually ‘Russian Spy Tools’
Your Phone Is Listening and it's Not Paranoia
Security

Your Phone Is Listening and it’s Not Paranoia

03/05/2020 No Comments iphoneprivacyspy

A couple of years ago, something strange happened. A friend and I were sitting at a bar, iPhones in pockets, discussing our recent trips in…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Your Phone Is Listening and it’s Not Paranoia
Airport Facial Recognition System Fooled
Security

Airport Facial Recognition System Fooled

16/12/2019 No Comments applebiometricfacial recognitioniphonemobilepayment

Facial recognition technology used to secure airports and process payments has been fooled by photographs and 3D masks. According to Fortune, multiple facial recognition systems in…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Airport Facial Recognition System Fooled
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?
Mobile Security

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

03/10/2019 No Comments appleexploitipadiphonejailbreakpatchvulnerability

The Checkm8 exploit, described by the security researcher who published it as “a permanent unpatchable bootrom exploit” might be good news for the jailbreaking community…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

RSS Feeds

  • Home » News » US National Cybersecurity Plan Promises to Safeguard Maritime Sector
  • Cybersecurity is still the #1 risk for manufacturers
  • The SolarWinds Breach: Three Security Takeaways for IT
  • Despite Quiet Weekend, Heavy State Capitol Security To Continue Through The Week
  • Free cyber career training coursework emerges as a perk in tough times
  • UNSW restarts search for new CISO
  • China cybersecurity and data protection: Review of 2020 and outlook for 2021
  • The Growing Importance of Security Assurance (And What It Means to Be Good at Compliance ...
  • FTSE 250 movers: Genus boosted by China, Chemring wanted as Cyber Security play
  • MoD reports 18% rise in data loss incidents

Recent Vulnerabilities

Maastricht Ransomware Case: A Year in Review in Light of 6 AMLD and OFAC – Finance Magnates

19/01/2021 No Comments
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

03/10/2019 No Comments
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

03/10/2019 No Comments
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

04/10/2019 No Comments
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

07/10/2019 No Comments
No comments found.
0day 2fa 4g abuse access control account admin adware aerospace agile ai amazon analytics android anonymity anonymous antivirus api app apple application security appsec apt art artificial intelligence assessment atm attachment attack audit authentication automation autonomous vehicles autopilot aws azure backdoor backup bcp bgp big data biometric bitcoin block blockchain blue team bluekeep bluetooth bot botnet breach breached browser brute force bug bug bounty business business continuity business impact byod camera capsule network cars casino censor cert certificate china chipset chrome cia cio cisco ciso click fraud cloud cnc code code signing compliance container cookie corona covid-19 crack credential stuffing credentials credit card crime critical infrastructure crypto cryptocurrency cryptography cryptojacking cryptomining currency cve cvss cyber cyber attack cyber defense cyber espionage cyber insurance cyber resilience cyberattack cybercrime cybersecurity cyberthreat cyberwarfare cylance darknet darkweb data data breach data leak database ddos debug decryption deepfake deepweb defcon detection devops devsecops diabetes dictionary attack digital digital forensics digital signature disaster recovery diy dkim dmarc dns docker domain doos dos dr e-commerce ecommerce edge computing email emotet encryption encryption keys enigma equifax espionage eternalblue ethereum european union exif exploit extortion facebook facial recognition fake fbi fileless firefox firewall forensics framework fraud ftp fuzzing gdpr git github gmail goldbrute google governance gps grc hack hacked hacker hacktivism hacktivist hash hijack hipaa honeypot hosting hsm https huawei hybrid cloud iam ibm ics identity incident incident handling incident management incident response india industrial control system information security infrastructure injection insider threat instagram insurance intel intelligence internet ioc ios iot ip ipad iphone isms iso iso 27001 iso27000 isp jailbreak kasperksy Kaspersky key keylogger kgb kubernetes law lawsuit leak legal libra linux lock lte mac machine learning malvertising malware managed security medical devices meltdown mfa microprocessor microsoft military mimikatz mirai misconfiguration mitm mitre mobile mobile app mongodb monitor mozilla mssp multi cloud music nasa netcat network nfc nosql notepad notpetya nsa office open source openssl operating system owasp password patch payment pdf penetration test personal information pgp phishing phone php pii pin plugin policy ponzi porn power grid powershell privacy private keys privilege access program programmer protection proxy python quantum ransomware raspberry pi rat rce rdp red team remote code execution response risk router rsa russia s3 saas satellite scada scam script security security awareness self driving car server serverless sextortion sha shell side channel skim smart city smart device smart home smart tv smartphone sms sniff soc social engineering social media software spam spear phishing spectre spf spoof spy spyware sql sqlite ssh ssl standard startup steganography storage stuxnet supply chain surveillance tcp teamviewer telegram tesla testing threat tls token tor trend trojan unix usa usb video virus vmware voice voip vpn vulnerability waf wannacry web website whatsapp whitehat wi-fi wifi wikileaks windows wipro wireless wordpress worm xss yubikey zero day zero trust zoom

Recent Posts

  • Maastricht Ransomware Case: A Year in Review in Light of 6 AMLD and OFAC – Finance Magnates
  • Telegram or Signal? Welcome to the illusion called data security – National Herald
  • Sussex foreign office outpost ‘breached by hackers’ – The Argus
  • Cyber Security Today Week In Review for Friday January 15, 2021
  • A closer look at the SolarWinds hack

Trending

rsa credential stuffing storage jailbreak cloud cnc remote code execution forensics standard multi cloud iam firewall wi-fi Kaspersky analytics fraud tesla operating system authentication ip
Follow Us

Search…

  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds
SecuritySifu | © Copyright All right reserved
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.