Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Protecting Against GoldPickaxe: The Leading iPhone Trojan | TechNews Technology News

Reading Time: < 1 minute

The GoldPickaxe Trojan, initially known for targeting Android users, has now evolved to pose a threat to iPhone users as well. Security firm Group-IB has identified GoldPickaxe as the world’s first iPhone Trojan, capable of stealing biometric data, text messages, and even posing as a bank to gather personal information such as ID card photos.

While the Trojan has primarily targeted users in Vietnam and Thailand by impersonating financial institution applications, Group-IB warns that the threat is still evolving. Despite Apple’s stringent vetting process for applications on the App Store, the GoldPickaxe Trojan managed to bypass their safeguards.

The distribution method used by cybercriminals involves malicious iOS mobile device management profiles. As the threat continues to evolve, distribution mechanisms may become more complex. To protect against GoldPickaxe, Apple users are advised to only install applications from trusted developers via the App Store, avoid installing iPhone MDM profiles from untrusted sources, refrain from sharing personal information over the phone, verify financial account details through official websites, and stay vigilant with operating system updates.

It is crucial for iPhone users to remain cautious and proactive in safeguarding their personal information and financial accounts against this sophisticated Trojan. By following these preventive measures, users can protect themselves from falling victim to the GoldPickaxe threat.

Taylor Swifts New Album Release Health issues from using ACs Boston Marathon 2024 15 Practical Ways To Save Money