Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Cursor admits that his new coding model was built on top of Moonshot AI’s Kimi

The SEC ends its four-year investigation into EV startup Faraday Future

Want to build a robot snowman?

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Want to build a robot snowman?

    23 March 2026

    Why Wall Street Didn’t Win Nvidia’s Big Conference

    22 March 2026

    New court filing reveals Pentagon told Anthropic the two sides were nearly aligned — a week after Trump declared his relationship

    21 March 2026

    Microsoft is retiring some of the Copilot AI bloat on Windows

    21 March 2026

    The best AI investment may be in energy technology

    20 March 2026
  • Apps

    Apps that distract you from the endless cycle of scrolling

    23 March 2026

    The features powered by Gemini in Google Workspace that are worth using

    22 March 2026

    Meta finally decides not to close Horizon Worlds in VR

    22 March 2026

    DoorDash Launches New ‘Tasks’ App That Pays Couriers to Submit Videos to Train AI

    21 March 2026

    Google is introducing a new way for users to download Android apps that still protects against fraud

    21 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026

    Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

    16 March 2026

    India neobank Fi removes banking services on its platform

    11 March 2026
  • Hardware

    Amazon is working on a new smartphone with Alexa at its core, the report says

    20 March 2026

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026

    Oura enters India’s smart ring market with Ring 4

    17 March 2026

    Apple quietly launches AirPods Max 2

    17 March 2026
  • Media & Entertainment

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026

    BuzzFeed debuts AI applications for new revenue

    17 March 2026

    Facebook makes it easy for creators to report copycats

    14 March 2026
  • Security

    Delve accused of misleading customers with ‘false compliance’

    22 March 2026

    Delve accused of misleading customers with ‘false compliance’

    21 March 2026

    The US accuses the Iranian government of operating a hacktivist group that hacked the Stryker

    20 March 2026

    CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

    20 March 2026

    FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

    19 March 2026
  • Startups

    Cursor admits that his new coding model was built on top of Moonshot AI’s Kimi

    23 March 2026

    Microsoft hires Sequoia-backed AI collaboration platform team Cove

    21 March 2026

    Consumer-focused privacy firm Cloaked raises $375 million as it expands into the enterprise

    20 March 2026

    Tools for founders to navigate and move past conflicts

    20 March 2026

    Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

    19 March 2026
  • Transportation

    The SEC ends its four-year investigation into EV startup Faraday Future

    23 March 2026

    Uber taps Rivian to build robotaxis in deal worth up to $1.25 billion

    22 March 2026

    Federal authorities intensify investigation into Tesla’s Full Self-Driving (Supervised) software

    21 March 2026

    Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

    21 March 2026

    Arc expands into electric commercial and defense vessels with $50M raise

    20 March 2026
  • Venture

    AI startups are eating up the venture industry, and the returns, so far, are good

    21 March 2026

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026

    Billionaires made a promise – now some want to leave

    17 March 2026

    Antonio Gracias Says He Longs For ‘Pre-Entropic’ Startups – Those Built To Survive Chaos

    17 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Apple corrects the iPhone and the iPad error used in a ‘highly sophisticated attack’
Security

Apple corrects the iPhone and the iPad error used in a ‘highly sophisticated attack’

techtost.comBy techtost.com10 February 202503 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Apple Corrects The Iphone And The Ipad Error Used In
Share
Facebook Twitter LinkedIn Pinterest Email

On Monday, Apple released updates on its mobile operating systems for iOS and iPados, which determined a defect that the company stated that “it may have exploited a highly sophisticated attack on specific targeted people”.

To the release notes for ios 18.3.1 and ipados 18.3.1The company reported that vulnerability allowed to disable the limited USB function “on a locked device”. Introduced in 2018, the limited USB feature is a security feature that prevents the ability of an iPhone or iPad from sending data to USB connection if the device is not unlocked for seven days. Last year, Apple has released another security feature that restarts the devices if not unlocked for 72 hours, making it more difficult to enforce the law or criminals using forensic tools to access data on these devices.

Based on its tongue used in the security update, Apple indicates that the attacks were most likely carried out with natural control of a person’s device, which means that anyone who abuses this defect had to be connected to the Apple devices of the person with a criminal device Like Cellegite or Graykey, two systems that allow law enforcement to unlock and access data stored on iPhones and other devices.

The vulnerability discovered by Bill MarczakA senior researcher at the Citizen Lab laboratory, a group of the University of Toronto who is investigating cyberspace against civil society.

Contact us

Do you have more information about this defect, or other zero days of iPhone and cyberettacks? From a non-work device, you can contact Lorenzo Franceschi-bicchierai safely on the signal on +1 917 257 1382, or via the telegraph and keybase @lorenzofb or email. You can also contact TechCrunch via securedrop.

Apple did not respond to a request for comments from the press time.

Marczak told TechCrunch that he could not comment on the file at this point.

It is not clear at the moment who was responsible for the abuse of this defect and against which it was used. However, there have been documented cases in the past, where law enforcement services have used forensic tools, which are usually abusing zero -day defects on devices such as iPhone, to unlock devices and access the data.

In December 2024, Amnesty International published a report that documented a series of attacks by the Serbian authorities where they used Cellebrite to unlock the phones of activists and journalists in the country and then install malware.

Security researchers said Cellebrite forensic devices were probably used “widely” in people in civil society, according to Amnesty.

apple attack citizen corrects cyberspace error Fluffy gray highly iOS iPad iPadOS ipher iPhone sophisticated
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAs GLP-1s Boom, Dietician Startups Berry Street, Fay every NAB $ 50m rounds
Next Article Zeta worth $ 2b in new funding
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Delve accused of misleading customers with ‘false compliance’

22 March 2026

Delve accused of misleading customers with ‘false compliance’

21 March 2026

The US accuses the Iranian government of operating a hacktivist group that hacked the Stryker

20 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Cursor admits that his new coding model was built on top of Moonshot AI’s Kimi

23 March 2026

The SEC ends its four-year investigation into EV startup Faraday Future

23 March 2026

Want to build a robot snowman?

23 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Amid legal turmoil, Kalshi is temporarily banned in Nevada

20 March 2026

Nominations for the Startup Battlefield 200 are still open

19 March 2026

Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

17 March 2026
Startups

Cursor admits that his new coding model was built on top of Moonshot AI’s Kimi

Microsoft hires Sequoia-backed AI collaboration platform team Cove

Consumer-focused privacy firm Cloaked raises $375 million as it expands into the enterprise

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.