Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

clock • 3 min read
Hackers can exploit iPhones' low-power mode functionality to run malware even when the device is off
Image:

Hackers can exploit iPhones' low-power mode functionality to run malware even when the device is off

Wireless chips in modern iPhones pose a new threat model

Researchers from the Technical University (TU) of Darmstadt's Secure Mobile Networking Lab examined the low-power mode (LPM) implementation on iPhones and discovered that it poses major security ri...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Avis notifies customers of data breach

Hacking

Personal Information of nearly 300,000 car rental customers exposed

clock 10 September 2024 • 3 min read
Apple's iPhone 16 to feature AI chip based on Arm V9

Chips and Components

Apple has already incorporated V9 into its M4 MacBook chips

clock 09 September 2024 • 2 min read
Pentagon contractor Leidos hit by data breach

Hacking

Internal documents leaked on cybercrime forum

clock 25 July 2024 • 2 min read
Most read
01

Ransomware targets London branch of China's ICBC

13 September 2024 • 2 min read
02
03

Teen arrested over TfL cyberattack

13 September 2024 • 3 min read
04

Avis notifies customers of data breach

10 September 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

China refuses to sign agreement on AI control of nuclear weapons

China refuses to sign agreement on AI control of nuclear weapons

Global call to maintain human involvement in all nuclear related decisions

clock 12 September 2024 • 3 min read
Microsoft Patch Tuesday: Four zero day bugs squashed

Microsoft Patch Tuesday: Four zero day bugs squashed

In a total of 79 vulnerabilities patched in September

John Leonard
clock 11 September 2024 • 2 min read
UK and allies reveal methodology of Russian GRU threat actor Unit 29155

UK and allies reveal methodology of Russian GRU threat actor Unit 29155

Group has targeted organisations including governments and critical infrastructure providers for espionage purposes

John Leonard
clock 06 September 2024 • 2 min read