Deep search
All
Copilot
Images
Videos
Maps
News
Shopping
More
Flights
Travel
Hotels
Notebook
Top stories
Sports
U.S.
Local
World
Science
Technology
Entertainment
Business
More
Politics
Any time
Past hour
Past 24 hours
Past 7 days
Past 30 days
Best match
Most recent
USB, iPhone
Apple iPhone USB-C Hacked—What Users Need To Know
The new Apple iPhone USB-C controller has been hacked in a worrying first. The hacker behind it explains what they did along with the security implications.
New hack breaks open Apple's USB-C security
A security researcher has worked out how to hack a proprietary USB-C controller used by Apple, an issue that could eventually lead to new iPhone jailbreaks and other security problems.
Researcher finds a vulnerability in the iPhone USB-C controller
A security researcher has been able to hack Apple’s USB-C controllers that are used in current iPhones, which would usually raise concerns about security and the ability to jailbreak the iPhone. But there’s probably nothing to worry about.
Apple’s proprietary USB-C controller has officially been hacked – what you need to know
In a solemn reminder that no system is 100% safe and unhackable, it was announced over the weekend that security researchers have managed to successfully hack Apple’s proprietary ACE3 USB-C controller,
iPhone 16, iPhone 15 models’ USB-C ports can be hacked, security researcher claims
Security researcher Thomas Roth has discovered a vulnerability in the Apple iPhone's USB-C controller, known as the ACE3.
Apple users facing new security risks after critical USB component hacked
Researcher uncovers method to hack the ACE3 USB-C Controller This is a critical component used for charging and data transfer for Apple devices Apple deemed the attack too complex to present a threat The ACE3 USB-C controller,
Apple devices at risk after security researcher hacks ACE3 USB-C controller
Apple Inc. users are facing new security risks after a security researcher successfully hacked Apple’s proprietary ACE3 USB-C controller, a critical component responsible for managing charging and data transfer on Apple’s latest devices.
iPhone, Phishing
New iPhone Phishing Scam Tricks Users into Disabling Security Features
New iPhone phishing scam bypasses iMessage security by tricking users into enabling malicious links through simple replies.
Security vulnerability in iPhone’s USB-C port, and a gotcha with iMessage scams
A security vulnerability has been discovered in the USB-C port controller fitted to the iPhone 15 and 16. However,
There’s a sophisticated new wave of phishing attacks targeting iPhone users
Scammers have upgraded their iPhone scams by asking users to reply to phishing texts in order to reenable malicious links.
14h
5 Ways to Enhance Your iPhone Privacy in 2025
In an increasingly digital world, protecting your personal data on your iPhone is more critical than ever before. With the ...
17h
Samsung Galaxy S25—Here’s Apple’s ‘Groundbreaking’ iPhone Defense
Samsung’s exciting new flagship launch is just a few weeks away, and promises an Android upgrade that’s the closest we’ve ...
2d
on MSN
4 ways Apple should upgrade its privacy and security game in 2025
Apple’s products are the most secure in the world. And yet, it still could do better. Here’s how. Every year, Apple adds ...
6d
How to automate iPhone reboots to improve performance & security
Regularly restarting your iPhone clears temporary files, refreshes system processes, and enhances security — and you can ...
10h
Apple Account Sign-In Guide for iPhone, Mac, and Web
Signing in to your Apple account is a crucial step in unlocking the full potential of Apple's ecosystem. From accessing ...
1d
on MSN
Change These iPhone Settings to Stop Apple From Collecting (Some of) Your Data
T here's a dichotomy between what Apple says about privacy and some of its actions. On the one hand, the company uses ...
MacWorld on MSN
1d
Hackers have devised a simple text scam to bypass Apple’s iPhone protections
Macworld The more we use our iPhones to chat, the more smishing (SMS phishing) attacks try to trick us into compromising our ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results
Feedback