Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Sony’s noise-canceling WH-1000XM5 headphones are a Prime Day steal at $150 off

    October 8, 2025

    This Startup Wants to Spark a US DeepSeek Moment

    October 8, 2025

    Alienware’s incredible 4K QD-OLED gaming monitor is $200 off

    October 8, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know
    Security

    Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

    News RoomBy News RoomMay 8, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    All that needs to happen is, the victim receives an iMessage with an attachment containing a zero-click exploit. “Without any further interaction, the message triggers a vulnerability, leading to code execution for privilege escalation and providing full control over the infected device,” says Boris Larin, principal security researcher at Kaspersky’s Global Research & Analysis Team.

    Once the attacker establishes their presence on the device, he says, the message is automatically deleted.

    Rise of Pegasus

    The most prominent and well-known spyware is Pegasus, made by Israeli firm NSO Group to target vulnerabilities in iOS and Android software.

    Spyware only exists because of vendors such as NSO Group, which claims it sells exploits to governments only to hunt criminals and terrorists. “Any customers, including governments in Europe and North America, agree not to disclose those vulnerabilities,” says Richard Werner, cybersecurity advisor at Trend Micro.

    Despite NSO Group’s claims, spyware has continued to target journalists, dissidents, and protesters. Saudi journalist and dissident Jamal Khashoggi’s wife, Hanan Elatr, was allegedly targeted with Pegasus before his death. In 2021, New York Times reporter Ben Hubbard learned his phone had been targeted twice with Pegasus.

    Pegasus was silently implanted onto the iPhone of Claude Magnin, the wife of the political activist Naama Asfari, who was jailed and allegedly tortured in Morocco. Pegasus has also been used to target pro-democracy protesters in Thailand, Russian journalist Galina Timchenko, and UK government officials.

    In 2021, Apple filed a lawsuit against NSO Group and its parent company to hold it accountable for “the surveillance and targeting of Apple users.”

    The case is still ongoing, with NSO Group attempting to dismiss the lawsuit, but experts say the problem is not going to go away as long as spyware vendors are able to operate.

    David Ruiz, senior privacy advocate at security firm Malwarebytes, blames “the obsessive and oppressive operators behind spyware, who compound its danger to society.”

    The Spyware Drain

    If you think you may be targeted by spyware, there are only a few useful things you can do. First, enable Apple’s Lockdown Mode, which disables certain features but is surprisingly usable and can protect your iPhone from getting infected in the first place. Second, if you suspect your device is already infected, helplines are available to aid you in removing spyware, such as Access Now’s Digital Security Helpline and Amnesty International’s Security Lab.

    Detecting spyware can be extremely challenging—and for sophisticated spyware like Pegasus, discovering an infection on your own is all but impossible. There are less-sophisticated types of spyware that can cause unusual behavior, such as your battery draining quickly, unexpected shutdowns, or high data usage could be indicative of some types of infections, says Javvad Malik, lead security awareness advocate at security training organization KnowBe4. While specific apps claim to spot spyware, their effectiveness can vary, and professional assistance is often necessary for reliable detection, he says.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Britax Willow SC Is a Great Travel System for Newborns
    Next Article You can get a $100 gift card when you preorder Google’s Pixel 8A

    Related Posts

    Google’s Latest AI Ransomware Defense Only Goes So Far

    October 6, 2025

    Where Do Your Passwords Go When You Die?

    October 4, 2025

    DHS Has Been Collecting US Citizens’ DNA for Years

    September 30, 2025

    ‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say

    September 30, 2025

    Russia Tests Hypersonic Missile at NATO’s Doorstep—and Shares the Video

    September 29, 2025

    Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification

    September 29, 2025
    Our Picks

    This Startup Wants to Spark a US DeepSeek Moment

    October 8, 2025

    Alienware’s incredible 4K QD-OLED gaming monitor is $200 off

    October 8, 2025

    Prime Day ends soon, but these deals are still going at Walmart

    October 8, 2025

    Get these Switch 2 accessories while they’re cheaper during October Prime Day

    October 8, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    I never lose my wallet with Nomad’s slim tracker, which is 20 percent off right now

    By News RoomOctober 8, 2025

    I used to misplace my wallet all the time, which always led to a mad…

    Our favorite batteries and chargers are on sale for October Prime Day

    October 8, 2025

    Discord says 70,000 users may have had their government IDs leaked in breach

    October 8, 2025

    Google Pixel 10 Pro Fold review: finally, a more durable foldable

    October 8, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.