Remove Apple Remove Government Remove Macedonia
article thumbnail

What is Hermit spyware and how do you protect yourself from it?

Mashable VR

On Apple devices, attackers used flaws in the company's protocols to distribute apps that can bypass the App Store but be subject to the same security enforcement mechanisms. TAG says it's tracking more than 30 vendors that sell "exploits or surveillance capabilities to government-backed actors." Credit: Google TAG.