A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks.
Macworld reports iOS 26.3 introduces key features including a built-in iPhone-to-Android transfer tool, enhanced location privacy for newer devices, and EU-specific third-party accessory notifications ...
Apple offers iPhone buyers a rich ecosystem of accessories, including the AirPods and Apple Watch. Since Apple controls the hardware and software, it can offer seamless integration between its devices ...
When Apple released iOS 26 back in September, many iPhone users were eager to try its new customizations, features, and security updates. But, as with major software transitions, the launch hasn't ...
Jake Peterson is Lifehacker’s Tech Editor, and has been covering tech news and how-tos for nearly a decade. His team covers all things technology, including AI, smartphones, computers, game consoles, ...
One of the biggest points of contention between Apple and the European Union regarding the Digital Markets Act is the upcoming requirement to allow third-party devices to display notifications ...
iOS 26.3 adds a new "Notification Forwarding" setting that allows incoming notifications on an iPhone to be forwarded to a third-party device. The setting is located in the Notification section of the ...
Apple just dropped iOS 26.2, and while most people are focused on the flashy updates to the system apps, there is a quieter change tucked away that might actually make a bigger difference in your ...
iPhone users are divided on iOS 26 and Liquid Glass. But general opinion might not be what you think. Apple has begun actively encouraging iPhone users to move from iOS 18 to iOS 26, and social media ...
Apple releases iOS 26.2 within days of issuing attack warnings to iPhone users around the world. Apple is about to release its next iPhone update. It has just furnished a second release candidate to ...
Cybercriminals are delivering malware via web browser features using a newly discovered command-and-control (C2) platform dubbed Matrix Push C2. The malicious C2 platform, discovered by BlackFrog, ...
Cybercriminals have a new, user-friendly tool for turning your browser alerts into a vector for phishing attacks. "Matrix Push" is slick, it's pretty, and it's about as easy to use as any commercial ...