Wednesday, June 3, 07:03
Home security Google: Hackers have been monitoring iPhone devices for years

Google: Hackers have been monitoring iPhone devices for years

The researchers of the Google security team, they discovered something unprecedented. According to a series of surveys they conducted, hackers were able to track mobile iPhones.

But let's see what happened from the beginning. A group of hackers used some sites that had been infected before, to introduce malware on mobile iPhones that would go to these sites. There, they needed nothing more, just a simple visit of the victim to the page was enough. Many times, some of the hacker's moves could even affect an updated cellphone. This business lasted two and a half years.


What happened now, when they introduced malware into the cell of the prospective victim? All user details and secrets were exposed. The exact location of the user, all his passwords, conversations from popular chat apps like WhatsApp, Telegram and iMessage, but also its database gmail their.

The only positive was that at each reboot, the memory was cleared until the user re-visited one of the "teased" sites and started the vicious cycle. However, according to a Google security researcher, hackers can maintain access to various accounts and services even when they lose access to the device itself.

Project Zero is a group of Google white-hat hackers who are looking for security vulnerabilities in technology. It is characterized by its most relentless approach, since 90 days after the virus was pointed at the victim, all details are publicly exposed, whether or not the problem has been corrected.


According to Google researchers, only iPhone users, and not just mobile users, can understand that such mass attacks happen and will continue to happen. That is why they have to realize that while mobile is an integral part of everybody's everyday life, it is still a device that can be exploited if someone is to expose their personal data.


Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows


Samsung Access: Samsung's new service for new Galaxy devices!

Samsung has launched a new subscription service for upgrades, starting with the Galaxy S20 series. The new service, named Samsung ...

Microsoft: The tools that will now be available to everyone!

Microsoft now has the "Virtual Assistant Accelerator" and "Bot Framework Composer" tools for its entire user base. Developers can ...

Sony: Cancel PS5 event due to Floyd case!

The event that Sony had planned for the PS5 on June 4 was postponed indefinitely, due to the deplorable situation that prevails ...

Cisco warns: These Nexus switches have been hit by a serious security flaw

Cisco has warned customers with Nexus switches running NX-OS software to install updates to address a serious flaw ...

Windows 10 May 2020 Update: Get Windows 10 for € 9.09

As we all know, Windows 10 May 2020 Update has been released. It is safer, more reliable and more efficient than ever. It is certain that with ...

Anonymous's hack includes data from previous leaks!

As protests over the death of George Floyd in Minneapolis have spread across the United States, cyberattacks have targeted police ...

Critical Exim errors have been fixed, but many servers are still at risk

The update of Exim mail servers is not fast enough and the members of the Russian hacker Sandworm team are actively exploiting three critical ...

New Cisco vulnerability that concerns you!

A new critical Cisco vulnerability has been identified that concerns you: For those who don't know, Cisco recently announced that some of the servers ...

Antifa tweets from extreme rightists call for violence!

The "Antifa tweets" that flooded Twitter and promoted violence, actually came from a well-known far-right group! The information came in ...

Apple introduces the new USB-C Diagnostic Tool

Apple introduces the new USB-C Diagnostic Tool. See the new features: Apple finally brings the new internal USB-C Diagnostic Tool, ...