π€ Do you think that regular software updates are enough to keep your Apple devices safe? There are certain vulnerabilities, like checkm8, that can't be patched by just updating iOS. In our Medium post, we discuss Apple devices that are still at risk of this vulnerability. Check it out now.
#Apple #iOS #cybersecurity #vulnerability
#Apple #iOS #cybersecurity #vulnerability
Medium
Still using outdated Apple devices? Weβll tell you why itβs dangerous
An overview of the checkm8 vulnerability and how it affects old Apple products
π7β€2
It would have been difficult to miss our recent bombshell post on the first ever iOS Trojan that harvests facial recognition data, GoldPickaxe. But if you did, check out our recap on Medium to get the key details about this emerging threat: https://group-ib.medium.com/ai-in-the-wrong-hands-new-ios-trojan-challenges-face-recognition-d451f6af6e2e
#cybersecurity #iOS #Trojan
#cybersecurity #iOS #Trojan
Medium
AI in the wrong hands: New iOS Trojan challenges face recognition
Key details about the new tool stealing biometric data
π₯12
π¨ Apple devices are being used more and more in both business and personal settings, which makes them prime targets for cybercriminals. Threat actors have started adapting effective Android threats to Apple devices. As a symptom of this trend, Group-IB recently uncovered GoldPickaxe, the first face-stealing iOS Trojan that has evolved from the infamous Android malware GoldDigger.
Against this background, it is crucial to investigate Apple threats and raise awareness among users. While some iOS vulnerabilities (e.g., Checkm8) cannot be fixed with software updates and pose risks to users, cybersecurity experts can leverage them to analyze and counteract the malware.
π Sergey Nikitin, Group-IBβs Chief Regional Officer and digital forensics expert, shares advice to help businesses and users detect and investigate malicious apps and other iOS threats.
π Read and apply his insights today
#GoldPickaxe #Malware #iOS #Cybersecurity #Apps #iPhone #FightAgainstCybercrime #CyberThreats
Against this background, it is crucial to investigate Apple threats and raise awareness among users. While some iOS vulnerabilities (e.g., Checkm8) cannot be fixed with software updates and pose risks to users, cybersecurity experts can leverage them to analyze and counteract the malware.
π Sergey Nikitin, Group-IBβs Chief Regional Officer and digital forensics expert, shares advice to help businesses and users detect and investigate malicious apps and other iOS threats.
π Read and apply his insights today
#GoldPickaxe #Malware #iOS #Cybersecurity #Apps #iPhone #FightAgainstCybercrime #CyberThreats
π12π₯1