• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Apple Announces ‘Lockdown Mode’ to Protect Journalists, Human Rights Workers From Spyware

You are here: Home / General Cyber Security News / Apple Announces ‘Lockdown Mode’ to Protect Journalists, Human Rights Workers From Spyware
July 7, 2022

Apple has declared a new set of iPhone attributes called “Lockdown Method.”

Unveiled in a blog post on Wednesday, Lockdown Mode will land on iOS 16, iPadOS 16, and macOS Ventura devices in the slide of this yr, and present a selection of security features.

Apple identified as the mode an “extreme, optional degree of security for the incredibly few end users who, for the reason that of who they are or what they do, may be personally focused by some of the most innovative electronic threats.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The organization instantly mentioned the NSO Team, and extra typically “other private providers producing condition-sponsored mercenary adware.”

Turning on Lockdown Mode will harden device defenses and strictly restrict particular functionalities, hence lessening the attack surface area that perhaps could be exploited by adware.

“Lockdown Manner is a groundbreaking ability that displays our unwavering motivation to shielding buyers from even the rarest, most sophisticated attacks,” discussed Ivan Krstić, Apple’s head of security engineering and architecture. 

In phrases of unique options, Lockdown Method will block most message attachment types and disable backlink previews.

The mode will also disable some web technologies like just-in-time (JIT) JavaScript compilation (except the consumer excludes a trusted web page from Lockdown Mode), and block incoming invitations and support requests.

Finally, wired connections with a laptop or computer or accent are blocked in Lockdown Method when iPhone is locked, configuration profiles are unable to be mounted, and the system can not enroll in cellular unit management (MDM).

Relocating ahead, Apple mentioned it intends to carry on to fortify Lockdown Manner and include new protections to it over time.

“While the vast the vast majority of buyers will in no way be the victims of highly focused cyberattacks, we will do the job tirelessly to guard the modest number of buyers who are,” Krstić reported.

“That contains continuing to style defenses specifically for these people, as very well as supporting researchers and corporations close to the globe executing critically vital perform in exposing mercenary firms that build these digital attacks.”

To this conclusion, the firm has also set up a new classification within the Apple Security Bounty system to reward researchers who find Lockdown Method bypasses and help strengthen its protections.

Bounties are doubled for all qualifying results in Lockdown Method, and they go up to a highest of $2m.


Some parts of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Microsoft Updates Windows 11 Subsystem for Android to Introduce Support For VPN-Assigned IPs
Next Post: TrickBot Gang Shifted its Focus on “Systematically” Targeting Ukraine trickbot gang shifted its focus on "systematically" targeting ukraine»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.