{"id":2251,"date":"2023-12-05T14:31:03","date_gmt":"2023-12-05T19:31:03","guid":{"rendered":"https:\/\/proliberation.com\/underthesun\/?p=2251"},"modified":"2026-01-12T14:13:52","modified_gmt":"2026-01-12T21:13:52","slug":"hackers-have-found-a-sneaky-new-way-to-spy-on-your-iphone","status":"publish","type":"post","link":"https:\/\/proliberation.com\/underthesun\/hackers-have-found-a-sneaky-new-way-to-spy-on-your-iphone\/","title":{"rendered":"Hackers have found a sneaky new way to spy on your iPhone"},"content":{"rendered":"\n<p>One of the many reasons people decide to go with one of the&nbsp;<a href=\"https:\/\/www.tomsguide.com\/us\/best-apple-iphone,review-6348.html\" rel=\"noreferrer noopener\" target=\"_blank\"><u>best iPhones<\/u><\/a>&nbsp;over their Android counterparts is due to security. However, as iPhones are known for being less prone to hacking, this also makes them the perfect target for hackers and other cybercriminals.<\/p>\n\n\n\n<p>Now though, it appears that hackers have figured out a clever way to bypass Apple\u2019s security checks through the use of third-party custom keyboards that let them spy on iPhone users.<\/p>\n\n\n\n<p>According to a&nbsp;<a href=\"https:\/\/www.certosoftware.com\/insights\/beware-of-what-you-type-the-rise-of-keyboard-based-iphone-hacking\/\" rel=\"noreferrer noopener\" target=\"_blank\"><u>new report<\/u><\/a>&nbsp;from security researcher Russell Kent-Payne at&nbsp;<a href=\"https:\/\/www.tomsguide.com\/news\/cyberstalkers-are-using-this-windows-11-tool-to-track-iphone-users-how-to-stay-safe\" rel=\"noreferrer noopener\" target=\"_blank\"><u>Certo Software<\/u><\/a>, this new attack method uses malicious keyboards to record private messages, browsing history and even passwords from unsuspecting iPhone users.<\/p>\n\n\n\n<p>Certo decided to look into the matter after the cybersecurity firm received multiple reports of&nbsp;<a href=\"https:\/\/www.tomsguide.com\/features\/netflix-series-you-makes-digital-stalking-a-romantic-matter-spoiler-alert-its-not\" rel=\"noreferrer noopener\" target=\"_blank\"><u>cyberstalking<\/u><\/a>&nbsp;incidents in which the stalkers appeared to know everything that their target had typed into their iPhone. Following its investigation, malicious third-party keyboards were found on all of the affected devices.<\/p>\n\n\n\n<p>Whether you use an iPhone with a third-party keyboard yourself or are worried about being spied on, here\u2019s everything you need to know about this new threat including steps you can take to protect yourself.<\/p>\n\n\n\n<p><a href=\"https:\/\/news.yahoo.com\/hackers-found-sneaky-way-spy-174037786.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>READ MORE<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the many reasons people decide to go with one of the&nbsp;best iPhones&nbsp;over their Android counterparts is due to security. However, as iPhones are known for being less prone to hacking, this also makes them the perfect target for hackers and other cybercriminals. Now though, it appears that hackers have figured out a clever [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2252,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85,83],"tags":[],"class_list":{"0":"post-2251","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-economics","8":"category-tech"},"_links":{"self":[{"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/posts\/2251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/comments?post=2251"}],"version-history":[{"count":1,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/posts\/2251\/revisions"}],"predecessor-version":[{"id":2253,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/posts\/2251\/revisions\/2253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/media\/2252"}],"wp:attachment":[{"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/media?parent=2251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/categories?post=2251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proliberation.com\/underthesun\/wp-json\/wp\/v2\/tags?post=2251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}