Cybersecurity firm claims high-profile Americans’ phones may have been targeted in a hacking campaign

The cybersecurity firm iVerify has reported evidence suggesting that several high-profile Americans in media, AI, and politics may have been targeted in a hacking campaign. This includes former members of Kamala Harris’ presidential campaign.

Key Points

  • iVerify found indications of hacking on the phones of five notable Americans and a European government official.
  • The firm claims that nearly 50,000 phones were analysed, with only six showing signs of exploitation.
  • Evidence suggests that spyware was installed discreetly to monitor the users without their consent.
  • Apple has disputed iVerify’s findings, attributing the indicators to a software bug, not a targeted hacking effort.
  • Apple asserts that there are no credible indications of an ongoing attack on its users.

Content Summary

According to iVerify, a cybersecurity firm, several high-profile figures may have had their phones hacked as part of a targeted campaign, with spyware being deployed to track their communications covertly. The report highlighted that all six suspect devices belonged to individuals likely to be of interest to espionage efforts. However, Apple has responded, stating that the evidence pointed out by iVerify resulted from a resolved bug rather than a sophisticated hacking attempt.

Context and Relevance

This article reveals alarming potential security threats faced by key individuals in society, shedding light on the risks of mobile security. With increasing dependency on smartphones, understanding the implications of cybersecurity incidents remains crucial for everyone, especially those in influential positions.

Why should I read this?

If you’re curious about how vulnerable our phones can be—especially for influential figures—this article’s findings might surprise you. It highlights the ongoing battles in cybersecurity and gives you a peek into the shadowy side of tech. Plus, with Apple contradicting the claims, it raises questions worth pondering about tech companies and user security.

Source: MacTech

Leave a Reply

Your email address will not be published. Required fields are marked *