What should users do when their iPhone is attacked by malware?
Apple has just sent notices to iPhone users in 92 countries about the risk of becoming targets of attacks by 'mercenary malware'.
Apple said iPhone users in 92 countries could be targets of mercenary spyware attacks. However, the company refused to disclose the cause of the incident. "We cannot provide further information about why we are sending you this notification, as it may help malware attackers adjust their behavior to avoid detection in the future," quote Apple announcement.
Ransomware for hire is Apple's way of referring to government-backed malware attacks on enemy nations. "Apple has detected that you are being targeted by a malware attack to gain remote control of an iPhone associated with Apple ID -xxx-," the technology company said.
According to TechCrunch, Apple sent this warning via email and iMessage linked to the user's Apple ID. In addition, the notification also appears when users access the Apple account login website.
The company said that although it cannot be 100% certain of its ability to identify attacks, the warning is well-founded and asked users to take it "seriously".
Apple's recommendations to users before the incident of malware attacking the iPhone
Previously, last October, Apple sent a similar warning to a number of journalists and politicians in India. After that, Amnesty International announced that they found NSO Group's Pegasus spy software in the iPhones of famous journalists in this country.
Warnings about spyware are often sent out as countries prepare to hold elections. Recently, many technology companies said they had recorded many activities aimed at influencing election results in some countries.
Apple recommends that users who receive the above notification contact the company's technical department for support. Meanwhile, iPhone users who have not received warnings also need to be extremely wary of security risks.
Technology experts recommend that to prevent malicious attacks, users should avoid installing applications from unofficial sources, do not click on strange links, or follow instructions from people they do not know.
At the same time, regularly update all software updates from the manufacturer. Users should also periodically turn off the phone and turn it back on to prevent malicious code from residing in the phone's memory.
You should read it
- Compare iPhone 13 and iPhone 12
- iPhone 12 marks 13 years of change for Apple
- Compare iPhone 13 Pro and iPhone 12 Pro
- How has the iPhone evolved, from 2007 to 2017?
- Should I upgrade my iPhone X to iPhone 13?
- Should iPhone 7, 7+ update iOS 14?
- The difference between iPhone 6S and iPhone 6S Plus?
- 6 steps not to be missed when choosing to buy an old iPhone
- Latest images of iPhone X, iPhone X Plus next generation, iPhone 6.1 inch, 4GB RAM and 2 batteries
- 7 reasons why you should buy iPhone X instead of iPhone 8
- Let's look back at all the iPhone generations Apple has launched over the past decade
- Summary of errors on the iPhone 12 series
Maybe you are interested
How to choose default microphone on Windows 10 9 best iOS emulators on Windows computers Chrome incognito mode is not 'secret', each user can get $ 5,000 compensation How to recover files and data deleted by Avast by mistake The most dangerous hackers on the planet: Anonymous, Equation Group, Department 121 ... What do you know about them? Anonymous threatened to knock down the New York Stock Exchange