Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
Security researchers discover the 'Coruna' exploit kit running on malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Rainbow Six Mobile debuts worldwide on Android and iOS with Operation Sand Wraith, introducing Deimos and a 5v5 siege ...
Apple CarPlay will soon support ChatGPT, Claude, and Gemini in iOS 26.4, expanding in-car AI options while keeping Siri as ...
Forbes contributors publish independent expert analyses and insights. Kate O’Flaherty is a cybersecurity and privacy journalist. Update Feb. 13: This article, originally published on Feb. 11, has been ...
This post, first published on Feb. 11, was updated Feb. 13 with extensive details of the contents of the new update. The first major iPhone update of 2026 has arrived, and iOS 26.3 introduces changes ...
Hackers are already exploiting a flaw that's being addressed by latest update Dubai: If you haven't updated your iPhone recently, now is the time to do it. Apple has just released iOS 26.3, and this ...
Apple's latest iOS update brings new wallpaper and location features as well as the ability to transfer data to an Android device. Credit: Jakub Porzycki/NurPhoto via Getty Images There's a new iOS ...
If you've made the leap to iOS 26 or are looking for a reason to upgrade, Apple just released iOS 26.3 with a few perks you might want to check out. Other Apple devices, such as the Mac, iPad, Apple ...
Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks. The vulnerability, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results