Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

clock • 3 min read
Hackers can exploit iPhones' low-power mode functionality to run malware even when the device is off
Image:

Hackers can exploit iPhones' low-power mode functionality to run malware even when the device is off

Wireless chips in modern iPhones pose a new threat model

Researchers from the Technical University (TU) of Darmstadt's Secure Mobile Networking Lab examined the low-power mode (LPM) implementation on iPhones and discovered that it poses major security ri...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Government urged to ban ransom payments to cybercriminals

Threats and Risks

'That is the urgent task to which the British and other governments should apply themselves,' says former head of NCSC

clock 05 March 2024 • 3 min read
Microsoft exposes state-backed hackers using AI tools for espionage

Threats and Risks

Hackers linked to Russian military intelligence have been using LLMs to delve into satellite communication protocols relevant to military operations in Ukraine

clock 15 February 2024 • 3 min read
UK joins allies in action against mercenary hackers

Government

The Pall Mall Process targets the business of cybercrime

clock 06 February 2024 • 2 min read
Most read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

Microsoft Patch Tuesday fixes two critical bugs

Microsoft Patch Tuesday fixes two critical bugs

Microsoft fixed 60 vulnerabilities, including 18 remote code execution flaws in its March Patch Tuesday update.

John Leonard
clock 13 March 2024 • 3 min read
Lazarus uploading malware to open-source PyPl software repository

Lazarus uploading malware to open-source PyPl software repository

Supply chain attack leaves developers in Asia at particular risk

clock 12 March 2024 • 3 min read
Patch VMware vulnerabilities, admins urged

Patch VMware vulnerabilities, admins urged

ESXi, Workstation Pro/Player, Fusion Pro/Fusion and Cloud Foundation affected

John Leonard
clock 07 March 2024 • 1 min read