The Most Common Exploits Found In Apple, iPhone

The Most Common Exploits Found In Apple, iPhone

Author: The most important weekly tech news + solutions. January 2, 2025 Duration: 5:16

In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I dive into how to identify previously used Pegasus malware URL links that were logged by Amnesty International and some of the most common exploits found in Apple photos including the iMessage 0 day vulnerabilities, which happened from 2019 to 2023.

Sign up FREE to watch more webinar clips here

To sign up:

✓ Click on 'Signup' in the navigation menu

✓ Enter your name and email

✓ Choose the Free $0 Webinar Access Membership option

✓ Click the confirmation link in your inbox

✓ Invite your friends and family to learn with you!



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit tbot.substack.com/subscribe

Hakeem Anwar hosts The #TBOT Show, a weekly podcast dedicated to cutting through the noise of the tech world. Instead of just reporting headlines, this show focuses on the technology news that actually shapes your daily routine, privacy, and digital freedom, explaining why it matters in clear terms. Each episode is designed to be concise and actionable, wrapping up in under twenty minutes. You’ll hear informed analysis and straightforward recommendations on how to navigate the week’s developments. True to its mission, every installment also provides a practical takeaway: this might be a powerful open-source tool you can use, a privacy-enhancing skill to learn, or a sustainable tech solution to implement. It’s a blend of necessary context and usable insight, making it a resource for anyone who wants to understand and take back control of their tech life. Tune in for a focused, efficient update that prioritizes depth over duration, ensuring you stay informed without being overwhelmed. This podcast delivers exactly what its author promises: the most important weekly tech news paired with tangible solutions.
Author: Language: English Episodes: 80

The #TBOT Show with Hakeem Anwar
Podcast Episodes
The TBOT Show | Episode #1 [not-audio_url] [/not-audio_url]

Duration: 22:52
Hey peeps, Its Hakeem! We’ve just released the first episode of the new #TBOT show which will be published every Friday from now on. 🔥 My focus with this show is to give you the most important tech stories every week in…
What Data is Your Phone Gathering? [not-audio_url] [/not-audio_url]

Duration: 2:22
In this clip from my new interview with the Macroaggressions Podcast, I talk about the huge multi billion dollar industry built on Google's AdWords and key information about individual users that are compiled into secret…
Brute Force Hacking Protection on Above Phone [not-audio_url] [/not-audio_url]

Duration: 3:49
In this clip from Above’s Hidden Signs Your Phone is Compromised webinar, I detail how Above Phone will lock out intruders who attempt to use brute force attacks on a pincode to guess the security password on your phone.…
Tools Law Enforcement Uses To Access iPhone, Android [not-audio_url] [/not-audio_url]

Duration: 9:43
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I discuss the importance of keeping your phone locked at all times and how Cellebrite tools can be used by law enforcement to capture and compro…
How GrapheneOS Protects You from Hackers and Malware [not-audio_url] [/not-audio_url]

Duration: 6:49
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I’m getting into the details about how GrapheneOS has hardened memory allocation to protect against various memory based exploits that attempt t…
How Hackers Exploit Big Tech Phones [not-audio_url] [/not-audio_url]

Duration: 3:57
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I explore how mobile network injection attacks use fake cell towers to redirect you from regular sites to a site that can infect your phone.Thos…