Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

clock • 3 min read
Hackers can exploit iPhones' low-power mode functionality to run malware even when the device is off
Image:

Hackers can exploit iPhones' low-power mode functionality to run malware even when the device is off

Wireless chips in modern iPhones pose a new threat model

Researchers from the Technical University (TU) of Darmstadt's Secure Mobile Networking Lab examined the low-power mode (LPM) implementation on iPhones and discovered that it poses major security ri...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Government urged to ban ransom payments to cybercriminals

Threats and Risks

'That is the urgent task to which the British and other governments should apply themselves,' says former head of NCSC

clock 05 March 2024 • 3 min read
Microsoft exposes state-backed hackers using AI tools for espionage

Threats and Risks

Hackers linked to Russian military intelligence have been using LLMs to delve into satellite communication protocols relevant to military operations in Ukraine

clock 15 February 2024 • 3 min read
UK joins allies in action against mercenary hackers

Government

The Pall Mall Process targets the business of cybercrime

clock 06 February 2024 • 2 min read

More on Threats and Risks

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read
US National Security Advisor Jake Sullivan warns of 'digital Pearl Harbor' targeting infrastructure

US National Security Advisor Jake Sullivan warns of 'digital Pearl Harbor' targeting infrastructure

White House warns of 'disabling cyberattacks' by Iran and China

Graeme Burton
clock 21 March 2024 • 3 min read
Fujitsu exposed client data, AWS keys and passwords for nearly a year, report

Fujitsu exposed client data, AWS keys and passwords for nearly a year, report

Unanswered questions about how many unauthorised parties may have accessed the sensitive information

clock 21 March 2024 • 3 min read