Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Save up to $500 This Month With Our Tempur-Pedic Promo Codes

    June 24, 2025

    Apple heard your complaints about the Liquid Glass Control Center

    June 24, 2025

    Phew: Apple fixed the Finder icon in macOS Tahoe 26

    June 23, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know
    Security

    Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

    News RoomBy News RoomMay 8, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    All that needs to happen is, the victim receives an iMessage with an attachment containing a zero-click exploit. “Without any further interaction, the message triggers a vulnerability, leading to code execution for privilege escalation and providing full control over the infected device,” says Boris Larin, principal security researcher at Kaspersky’s Global Research & Analysis Team.

    Once the attacker establishes their presence on the device, he says, the message is automatically deleted.

    Rise of Pegasus

    The most prominent and well-known spyware is Pegasus, made by Israeli firm NSO Group to target vulnerabilities in iOS and Android software.

    Spyware only exists because of vendors such as NSO Group, which claims it sells exploits to governments only to hunt criminals and terrorists. “Any customers, including governments in Europe and North America, agree not to disclose those vulnerabilities,” says Richard Werner, cybersecurity advisor at Trend Micro.

    Despite NSO Group’s claims, spyware has continued to target journalists, dissidents, and protesters. Saudi journalist and dissident Jamal Khashoggi’s wife, Hanan Elatr, was allegedly targeted with Pegasus before his death. In 2021, New York Times reporter Ben Hubbard learned his phone had been targeted twice with Pegasus.

    Pegasus was silently implanted onto the iPhone of Claude Magnin, the wife of the political activist Naama Asfari, who was jailed and allegedly tortured in Morocco. Pegasus has also been used to target pro-democracy protesters in Thailand, Russian journalist Galina Timchenko, and UK government officials.

    In 2021, Apple filed a lawsuit against NSO Group and its parent company to hold it accountable for “the surveillance and targeting of Apple users.”

    The case is still ongoing, with NSO Group attempting to dismiss the lawsuit, but experts say the problem is not going to go away as long as spyware vendors are able to operate.

    David Ruiz, senior privacy advocate at security firm Malwarebytes, blames “the obsessive and oppressive operators behind spyware, who compound its danger to society.”

    The Spyware Drain

    If you think you may be targeted by spyware, there are only a few useful things you can do. First, enable Apple’s Lockdown Mode, which disables certain features but is surprisingly usable and can protect your iPhone from getting infected in the first place. Second, if you suspect your device is already infected, helplines are available to aid you in removing spyware, such as Access Now’s Digital Security Helpline and Amnesty International’s Security Lab.

    Detecting spyware can be extremely challenging—and for sophisticated spyware like Pegasus, discovering an infection on your own is all but impossible. There are less-sophisticated types of spyware that can cause unusual behavior, such as your battery draining quickly, unexpected shutdowns, or high data usage could be indicative of some types of infections, says Javvad Malik, lead security awareness advocate at security training organization KnowBe4. While specific apps claim to spot spyware, their effectiveness can vary, and professional assistance is often necessary for reliable detection, he says.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Britax Willow SC Is a Great Travel System for Newborns
    Next Article You can get a $100 gift card when you preorder Google’s Pixel 8A

    Related Posts

    ‘No Kings’ Protests, Citizen-Run ICE Trackers Trigger Intelligence Warnings

    June 23, 2025

    Israel Says Iran Is Hacking Security Cameras for Spying

    June 23, 2025

    Iran’s Internet Blackout Adds New Dangers for Civilians Amid Israeli Bombings

    June 22, 2025

    Israel-Tied Predatory Sparrow Hackers Are Waging Cyberwar on Iran’s Financial System

    June 21, 2025

    6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties

    June 17, 2025

    Why We Made a Guide to Winning a Fight

    June 16, 2025
    Our Picks

    Apple heard your complaints about the Liquid Glass Control Center

    June 24, 2025

    Phew: Apple fixed the Finder icon in macOS Tahoe 26

    June 23, 2025

    Here’s another chance to pick up the GameCube controller for Switch 2

    June 23, 2025

    Yale’s new Google Home smart lock is here — but it costs more thanks to tariffs

    June 23, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    T-Mobile’s satellite service officially launches in July

    By News RoomJune 23, 2025

    When it goes live next month, “T-Satellite” will be available as an included service with…

    Samsung confirms Unpacked for early July

    June 23, 2025

    Trump’s FTC will approve an ad merger — with a gift to Elon Musk’s X

    June 23, 2025

    ‘Major Anomaly’ Behind Latest SpaceX Starship Explosion

    June 23, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.