
A sophisticated iPhone hacking technique and surveillance campaign ran rampant internationally for months, prior to a patch in iOS 26.3.
iPhone Air
A new and severe attack vector focused on iPhones paired two different vulnerabilities into one. The “DarkSword” attack started with malicious web content in Safari, and ended with full kernel control, allowing attackers to break out of browser protections and access core parts of the system.
With that level of access, attackers can read messages and stored data, track location, access photos and files, and potentially activate the microphone or camera. In practice, it gives near-complete visibility into the device and the user’s activity.
Continue Reading on AppleInsider | Discuss on our Forums
