Apple officially launched the iPhone Research Device Program, and will send iPhone hackers and security researchers special devices that will make it easier for them to find bugs and vulnerabilities.
The new unc0ver jailbreak relies on a vulnerability that the researcher who found it says Apple is unaware of.
Several people, including security researchers, hackers, and bloggers, have had access to an early version of the new iOS 14 for months.
Tesla is getting more aggressive in revoking paid software features on used cars, raising the stakes in a battle over what used Teslas can do that has raged for years.
Apple asked Twitter to take down a viral tweet posted by an independent iPhone security researcher. Then, the company backtracked and asked for the tweet to be re-posted.
It may be the biggest attack against iPhone users yet.
Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers.
Apple expanded the scope of its bug bounty, increased payouts, and promised special devices to a select group of researchers. For jailbreakers and hackers, there’s never been a better time to pwn the iPhone.
Very few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world.
Doxing rivals, stealing each other’s files, and poking around Nintendo’s servers are all a normal part of the ballooning Nintendo Switch hacking and piracy scenes.
This is how a small group of friends lost control of the leaked iBoot source code. The story behind one of Apple's most embarrassing leaks.