DJI Phantom 3

How To Clear Iphones

Embark on a Quest with How To Clear Iphones

Step into a world where the focus is keenly set on How To Clear Iphones. Within the confines of this article, a tapestry of references to How To Clear Iphones awaits your exploration. If your pursuit involves unraveling the depths of How To Clear Iphones, you've arrived at the perfect destination.

Our narrative unfolds with a wealth of insights surrounding How To Clear Iphones. This is not just a standard article; it's a curated journey into the facets and intricacies of How To Clear Iphones. Whether you're thirsting for comprehensive knowledge or just a glimpse into the universe of How To Clear Iphones, this promises to be an enriching experience.

The spotlight is firmly on How To Clear Iphones, and as you navigate through the text on these digital pages, you'll discover an extensive array of information centered around How To Clear Iphones. This is more than mere information; it's an invitation to immerse yourself in the enthralling world of How To Clear Iphones.

So, if you're eager to satisfy your curiosity about How To Clear Iphones, your journey commences here. Let's embark together on a captivating odyssey through the myriad dimensions of How To Clear Iphones.

Showing posts sorted by relevance for query How To Clear Iphones. Sort by date Show all posts
Showing posts sorted by relevance for query How To Clear Iphones. Sort by date Show all posts

You Should Probably Clear Your IPhone Cache


You Should Probably Clear Your iPhone Cache


You Should Probably Clear Your iPhone Cache

Your iPhone is a handy, versatile piece of technology. Looking for a new recipe? Easy. Need a new internet provider? You can do that, too. Trying to figure out which actor appeared in the most 007 movies? Just search online. (The answer: Desmond Llewelyn, who appeared as Q in 17 Bond films from the '60s through the '90s.) Regardless of what you need it for, your iPhone does a lot of work.

But here's the thing: Whether you do your browsing in Chrome, Safari or elsewhere, your cache builds up digital clutter over time. Clearing your cache gives your browser a new start, which can speed up your browsing whether you're using iOS 15 or the public beta of iOS 16. (And if you're trying to get your phone to run faster, try managing your iPhone's storage.) 

CNET Tech Tips logo

Clearing your cache is like clearing out your fridge. When you visit a site, your iPhone downloads photos, banners and other data. To make that process faster, most browsers store some data in a cache to make loading faster. It's great when the fridge is fully stocked and you can quickly grab what you need... and less great when the thing you grab expired two months ago. 

Eventually, your browser's cache will become outdated and the data being retrieved no longer matches the data actually being used on the website. The result? Slower load speeds and wonky website formatting. This is the equivalent of your fridge being full of gross, expired products.

That's why clearing your cache can help: It gives sites a fresh start in your browser and frees up some space in your storage. Note that clearing your cache will sign you out of sites you're currently logged into. Still, it's generally worth that mild inconvenience about every month to keep things moving quickly. 

Here are step-by-step guides on how to clear your cache on your iPhone based on the browser you use. 

How to clear your iPhone cache in Safari

Safari is the default browser on iPhones, and you can clear your Safari cache in a few short steps. Starting with iOS 11, following this process will affect all devices signed in to your iCloud account. As a result all your devices' caches will be cleared, and you'll need to sign in to everything the next time you use them. Here's what to do.

1.Open the Settings app on your iPhone.

2. Select Safari from the list of apps.

3. Go to Advanced > Website Data.

4. Scroll down and select Clear History and Website Data.

5. Choose Remove Now in the pop-up box.

Then you're set!

Read more:Best iPhone for 2022

How to clear your iPhone cache in Chrome

Google Chrome internet browser

It's easy to clear your iPhone cache in Chrome.

James Martin/CNET

Chrome is another popular browser for iPhone users. The overall process for clearing your Chrome cache requires a few more steps, and you'll need to do things through the Chrome browser itself. Here's how. 

1. Open the Chrome app.

2. Select the three dots in the bottom right to open more options.

3. Scroll down and select Settings.

4. Select Privacy in the next menu.

5. Then select Clear Browsing Data to open up one last menu.

6. Select the intended time range at the top of the menu (anywhere from Last Hour to All Time).

7.Make sure that Cookies, Site Data is selected, along with Cached Images and Files. Finally, hit Clear Browsing Data at the bottom of the screen.

Read more: This iPhone Setting Stops Ads From Following You Across the Web

How to clear your iPhone cache in Firefox

If you're a Firefox devotee, don't worry. Clearing the cache on your iPhone is pretty straightforward. Just follow these steps. 

1. Click the hamburger menu in the bottom right corner to open up options.

2. Choose Settings at the bottom of the menu.

3. Select Data Management in the Privacy section.

4. You can select Website Data to clear data for individual sites, or select Clear Private Data at the bottom of the screen to clear data from all selected fields.

Read more: Experiencing Slow Wi-Fi? It Could Be Caused By Internet Throttling. Here's How to Tell

What happens when you clear the cache? 

Clearing your cache removes the website data your phone stored locally to prevent having to download that data upon each new visit. The data in your cache builds over time and can end up slowing things down if it becomes too bulky. (My phone had about 150MB of data stored in Chrome when I checked.) Clearing that data gives sites a fresh start, which may fix some loading errors and speed up your browser. However, clearing your cache also signs you out of pages, so be prepared to sign in to everything again. 

How often do I need to clear my cache?

Most people only need to clear their caches once every month or two. That's generally the point when your browser will build up a cache large enough to start slowing things down. If you frequent a large number of sites, you should err on the side of clearing your cache more often.

For more, check out how to FaceTime between an iPhone and an Android device, how to download iOS 15 on your iPhone right now and five creative, fun photo projects to try with your phone at home. You can also take a look at CNET's list of the best cases for the iPhone 13


Source

Tags:

You Should Probably Clear Your IPhone Cache


You Should Probably Clear Your iPhone Cache


You Should Probably Clear Your iPhone Cache

Your iPhone is a handy, versatile piece of technology. Looking for a new recipe? Easy. Need a new internet provider? You can do that, too. Trying to figure out which actor appeared in the most 007 movies? Just search online. (The answer: Desmond Llewelyn, who appeared as Q in 17 Bond films from the '60s through the '90s.) Regardless of what you need it for, your iPhone does a lot of work.

But here's the thing: Whether you do your browsing in Chrome, Safari or elsewhere, your cache builds up digital clutter over time. Clearing your cache gives your browser a new start, which can speed up your browsing whether you're using iOS 15 or the public beta of iOS 16. (And if you're trying to get your phone to run faster, try managing your iPhone's storage.) 

CNET Tech Tips logo

Clearing your cache is like clearing out your fridge. When you visit a site, your iPhone downloads photos, banners and other data. To make that process faster, most browsers store some data in a cache to make loading faster. It's great when the fridge is fully stocked and you can quickly grab what you need... and less great when the thing you grab expired two months ago. 

Eventually, your browser's cache will become outdated and the data being retrieved no longer matches the data actually being used on the website. The result? Slower load speeds and wonky website formatting. This is the equivalent of your fridge being full of gross, expired products.

That's why clearing your cache can help: It gives sites a fresh start in your browser and frees up some space in your storage. Note that clearing your cache will sign you out of sites you're currently logged into. Still, it's generally worth that mild inconvenience about every month to keep things moving quickly. 

Here are step-by-step guides on how to clear your cache on your iPhone based on the browser you use. 

How to clear your iPhone cache in Safari

Safari is the default browser on iPhones, and you can clear your Safari cache in a few short steps. Starting with iOS 11, following this process will affect all devices signed in to your iCloud account. As a result all your devices' caches will be cleared, and you'll need to sign in to everything the next time you use them. Here's what to do.

1.Open the Settings app on your iPhone.

2. Select Safari from the list of apps.

3. Go to Advanced > Website Data.

4. Scroll down and select Clear History and Website Data.

5. Choose Remove Now in the pop-up box.

Then you're set!

Read more:Best iPhone for 2022

How to clear your iPhone cache in Chrome

Google Chrome internet browser

It's easy to clear your iPhone cache in Chrome.

James Martin/CNET

Chrome is another popular browser for iPhone users. The overall process for clearing your Chrome cache requires a few more steps, and you'll need to do things through the Chrome browser itself. Here's how. 

1. Open the Chrome app.

2. Select the three dots in the bottom right to open more options.

3. Scroll down and select Settings.

4. Select Privacy in the next menu.

5. Then select Clear Browsing Data to open up one last menu.

6. Select the intended time range at the top of the menu (anywhere from Last Hour to All Time).

7.Make sure that Cookies, Site Data is selected, along with Cached Images and Files. Finally, hit Clear Browsing Data at the bottom of the screen.

Read more: This iPhone Setting Stops Ads From Following You Across the Web

How to clear your iPhone cache in Firefox

If you're a Firefox devotee, don't worry. Clearing the cache on your iPhone is pretty straightforward. Just follow these steps. 

1. Click the hamburger menu in the bottom right corner to open up options.

2. Choose Settings at the bottom of the menu.

3. Select Data Management in the Privacy section.

4. You can select Website Data to clear data for individual sites, or select Clear Private Data at the bottom of the screen to clear data from all selected fields.

Read more: Experiencing Slow Wi-Fi? It Could Be Caused By Internet Throttling. Here's How to Tell

What happens when you clear the cache? 

Clearing your cache removes the website data your phone stored locally to prevent having to download that data upon each new visit. The data in your cache builds over time and can end up slowing things down if it becomes too bulky. (My phone had about 150MB of data stored in Chrome when I checked.) Clearing that data gives sites a fresh start, which may fix some loading errors and speed up your browser. However, clearing your cache also signs you out of pages, so be prepared to sign in to everything again. 

How often do I need to clear my cache?

Most people only need to clear their caches once every month or two. That's generally the point when your browser will build up a cache large enough to start slowing things down. If you frequent a large number of sites, you should err on the side of clearing your cache more often.

For more, check out how to FaceTime between an iPhone and an Android device, how to download iOS 15 on your iPhone right now and five creative, fun photo projects to try with your phone at home. You can also take a look at CNET's list of the best cases for the iPhone 13


Source

Tags:

Don't Pull A Rudy Giuliani: Prevent Butt-dialing With These 5 Tips


Don t pull a rudy giuliani prevent senior don t pull a rudy giuliani borat don t pull a rudy giuliani girlfriend don t pull a wry face don t pull a stunt doodlebops don t pull the rope don t pull out make me pregnant we don t talk about bruno wait wait don t tell me don t stop believing dogs that don t shed
Don't pull a Rudy Giuliani: Prevent butt-dialing with these 5 tips


Don't pull a Rudy Giuliani: Prevent butt-dialing with these 5 tips

I've done it, you've done it, and now the president's lawyer is guilty of it too -- I'm talking, of course, about butt-dialing. Butt-dialing, or "pocket-dialing" as it's called in politer circles, is the result of a perfect storm of bad smartphone habits that starts with forgetting to lock your device. Next you toss your unlocked phone into a pants pocket (often a rear one). Then, as you move around with your unlocked phone shifting in your pocket, taps and bumps combine with static electricity and a bit of moisture to fool your phone's touchscreen into thinking it's being pressed, pinched or zoomed.
From there, it's really just a crapshoot in terms of which app your phone opens or who it decides to call. In Rudy Giuliani's case, the former mayor's phone dialed a reporter Giuliani had recently spoken with. The call went to voicemail, capturing part of a chat between Giuliani and an associate.
Butt-dialing happens to everyone, so here are f ive ways to make sure it's not your behind on the line when it does. 

apple-iphone-11-1421

Forgetting to turn off your phone's screen before pocketing it is the first step to an accidental butt-dial. 

Angela Lang/CNET

Lock. It. Up.

If everyone would just remember to hit the power button to turn off their screens before pocketing their phones, we could leave butt-dialing behind us. But I get it -- the whole point of owning a phone is convenience. Thankfully, both iPhones ($500 at Best Buy) and Android phones have an auto-lock setting that can turn your screen off for you. iPhones will turn off their screen and lock the phone in as little as 30 seconds with no activity. Android phones have an even shorter option: 15 seconds.
Depending on how you use your phone, setting auto-lock to 15 or 30 seconds may be more trouble than it's worth. For example, if you read a lot of news or e-books you may find your phone screen going dim before you're finished reading the page you're on. But if you want to avoid the shame of pocket-dialing, you may want to try and adjust the time setting so it works for you.
Here's how to change the aut o-lock or sleep setting on your iPhone or Android:
1. Open Settings.
2. Tap Display or Display & Brightness.
3. Tap Sleep or Auto-Lock or Screen timeout (your phone may call it something slightly different).
4. Choose the shortest interval you feel comfortable with.

215-google-pixel-4-and-google-pixel-4-xl

Google's new face unlock feature uses a combination of radar and infrared sensors.

Sarah Tew/CNET

Use a passcode, fingerprint or facial recognition to unlock

If you don't have a security lock on your phone, set one. Not securing your phone with a security lock can leave you vulnerable to crooks and snoops and makes your phone more likely to unlock itself in your pocket. Adding a passcode or requiring a fingerprint or facial identification to unlock your phone makes butt-dialing practically impossible, so long as you lock your phone before you pocket it. 

Here's how to set your phone to require a passcode, fingerprint or facial identification to unlock:
1. Open Settings.
2. Tap Security and lock screen or Touch ID & Passcode or Face ID & Passcode.
3. If you already have a passcode, you may be asked to enter it.
4. Set your phone to require a passcode, fingerprint or facial identification to unlock.

ios-siri-mac-mac-os-780x405

If your digital assistant can be summoned from the lock screen it can also accidentally make calls without your knowledge. 

Nicholas Tufnell/CNET

Give your digital assistant a break when your phone is locked

Whether you use Siri on iPhone or Google Assistant on Android, it's quite possible your digital assistant is to blame for the occasional butt-dial. If your phone is set to always listen for "Hey, Siri" or "OK, Google," or you can summon either assistant with a button while the screen is locked, your chances of butt-dialing increase exponentially. All it takes is a misunderstood word or phrase or an errant button press and next thing you know your assistant is dialing out.
Here's how to restrict Siri to only respond when your iPhone is unlocked:
1. Open Settings.
2. Tap Siri & Search.
3. Next to Listen for "Hey Siri" turn the toggle off.
4. Next to Allow Siri When Locked turn the toggle off.
Here's how to restrict Google Assistant to o nly respond when your Android phone is unlocked:
1. Launch Google Assistant.
2. Tap the inbox icon in the lower left corner to open Assistant settings.
3. Tap your profile picture in the upper right corner.
4. Tap Assistant on the top menu bar.
5. Scroll all the way down to the Assistant devices section and tap Phone.
6. Next to Access with Voice Match turn the toggle off.
7. Next to Lock screen personal results turn the toggle off. 

The ZTE Open feature a traditional phone dialer, with tabs along the bottom to access recent calls, contacts, and the dialpad.

Clear your recent call history to avoid butt-dialing the people you last spoke to.

Screenshot Clifford Colby/CNET

Practice good phone hygiene

As happened with Giuliani, your phone may pocket-dial the last person you spoke to. One way to make sure that doesn't happen is to clear your recent call history. You may especially want to do this if you've recently spoken with, shall we say, sensitive contacts, like your boss, an ex or a political journalist.
Also be sure you don't have anyone saved in your speed-dial or favorites folder to whom a butt-dial might result in negative repercussions. Basically, the easier you make it to call someone, the easier it is for your phone to accidentally call them.
If you have an Android device, you can take an additional step and make sure you have on-body detection turned off. The whole point of on-body detection is to keep your phone unlocked while it's on your person, which is simply an open invitation to butt-dialing.
Here's how to turn off on-body detection on an Android phone:
1. Open Setting s.
2. Tap Security > Smart lock
3. Enter your passcode.
4. Tap On-body detection.
5. Turn the toggle off.
Butt-dials aren't the only modern-day frustration vexing smartphone owners. As the sheer volume of robocalls continues to rise, wireless carriers are starting to address the problem themselves, but in the meantime there's still more you can do to protect yourself. If you're stoked about dark mode on your phone but salty more app developers haven't gotten onboard with it yet, at least Gmail has finally caught up with the dark mode trend. Finally, are you still trying to figure out the right combination of presses, taps and swipes to take a screenshot on your phone? Check out our guide to taking screenshots on any phone.

Originally published earlier this week.


Source

IOS 14 And IPadOS 14 Upgrade Checklist: Here's How To Get Your IPhone And IPad Ready


iOS 14 and iPadOS 14 upgrade checklist: Here's how to get your iPhone and iPad ready


iOS 14 and iPadOS 14 upgrade checklist: Here's how to get your iPhone and iPad ready

Apple's iOS 14 and iPadOS 14 updates for the iPhone ($500 at Best Buy) and iPad ($176 at Amazon) are brimming with important and useful new features, from a new app library and widgets on your home screen to tighter privacy features and iMessage improvements. But before you install iOS 14 and iPad 14, there's a bit of basic housekeeping you should do to make the update to your iPhone and iPad go as smoothly as possible. We lay out everything you need to know, including a checklist of how to get your phone or tablet ready.

Which devices will support iOS 14 and iPadOS?

If you have a compatible device, you should be able to see you have an update available by going to Settings > General > Software Update. But, don't tap Install Now quite yet.

Devices that will support iOS 14, iPadOS 14

Phone 11 iPad Pro 12.9-inch (4th generation)
iPhone 11 Pro iPad Pro 11-inch (2nd generation)
iPhone 11 Pro Max iPad Pro 12.9-inch (3rd generation)
iPhone XS iPad Pro 11-inch (1st generation)
iPhone XS Max iPad Pro 12.9-inch (2nd generation)
iPhone XR iPad Pro 12.9-inch (1st generation)
iPhone X iPad Pro 10.5-inch
iPhone 8 iPad Pro 9.7-inch
iPhone 8 Plus iPad (7th generation)
iPhone 7 iPad (6th generation)
iPhone 7 Plus iPad (5th generation)
iPhone 6s iPad Mini (5th generation)
iPhone 6s Plus iPad Mini 4
iPhone SE (1st generation) iPad Air (3rd generation)
iPhone SE (2nd generation) iPad Air 2
iPod Touch (7th generation)

Don't skip this step: Clear out the clutter

When it comes time to update software or upgrade your phone, take a few minutes to go through and delete what photos and apps you don't want or need from your camera roll and installed apps.

Our phones are a digital junk drawer of sorts, collecting random screenshots, photos, videos and single-use apps. Taking a few minutes to clear it out helps free up storage, shortens the amount of time you'll spend waiting for it to backup, and even saves you some cash if you're paying for extra iCloud storage just to keep it backed up.

Delete those apps you know you'll never use again. 

Jason Cipriani/CNET

Create a fresh backup, it's important

If you can help it, you should never update your iPhone or iPad without a current backup. Updates aren't a perfect process, and sometimes things go wrong. The last thing you want to happen is an update to fail, then you're left setting up your phone as brand new. Nobody wants that.

It's best to do this step right before you start the update process, that way the information stored in your backup is as current as possible.

You can backup your devices using iCloud, using Finder on Mac, or iTunes on a PC. iCloud is by far the easiest method, simply because it's built into your device and only requires a Wi-Fi connection. That said, if you're out of iCloud storage space or prefer to have more control over your device backup, then you can use your computer.

iphone-icloud-backup

iCloud backup is the easiest method. 

Screenshots by Jason Cipriani/CNET

Option 1: Use iCloud backup

If you have iCloud backup turned on, your device should be backing up each night while it's charging and connected to Wi-Fi. However, you can force a backup at any time by going to Settings > tap on your name > iCloud > iCloud Backup > Back up now.

Speed up the process by plugging your phone or tablet in to a charger and connecting it to a Wi-Fi network to prevent mobile data use and killing your battery in the process.

iphone-11-sync-finder

Finder looks just like iTunes when your iOS device is connected. 

Screenshot by Jason Cipriani/CNET

Option 2: Backup on a Mac

If it's been awhile since you've backed up your device using a Mac, the process has changed. With the death of iTunes last year, you'll now have to use Finder to create a backup.

I have a guide detailing the entire process, which truly isn't all that different than the old iTunes-based method.

It distills down to connecting your device to your Mac, opening it in Finder and then clicking a couple of boxes to start a backup.

itunes-icloud-backup

Make sure to encrypt the backup to make the restoration process so much easier. 

Screenshot by Jason Cipriani/CNET

Option 3: Backup on a PC

Use Windows? You can still use iTunes, just like you always have, to back up your mobile Apple devices.

Before you start, make sure you have the latest version of iTunes installed. The easiest way to do that is just to open it, and if you see a prompt to update it, then do follow the steps.

With that done, connect your device to iTunes using a Lightning or USB-C cable. The rest of the process consists of selecting your device in the iTunes interface and starting a backup. We have outlined all of the steps in this post, but let me make one more recommendation: Click the box that says you want to Encrypt your local backup. Doing so will backup all of your email accounts and app passwords, saving you from having to enter those whenever you have to restore your phone.

Now that you have your phone backed up and all of the random junk and clutter removed, install iOS 14 or iPadOS 14. Once it's installed, check out some of our favorite features, including the new homescreen that includes widgets -- that you can customize.


Source

Tags:

Pegasus Spyware And Citizen Surveillance: Here's What You Should Know


Pegasus Spyware and Citizen Surveillance: Here's What You Should Know


Pegasus Spyware and Citizen Surveillance: Here's What You Should Know

For digital spying technology, it's a doozy of a case. Security researchers have revealed evidence of attempted or successful installations of Pegasus, software made by Israel-based cybersecurity company NSO Group, on phones belonging to activists, rights workers, journalists and businesspeople. They appear to have been targets of secret surveillance by software that's intended to help governments pursue criminals and terrorists, and as the months go by, more and more Pegasus infections are emerging.

The most recent revelation is that Pegasus infected the phones of at least 30 Thai activists, according to a July report from Citizen Lab, a Canadian security organization at the University of Toronto. Apple warned those with infected phones in November.

To try to thwart such attacks, Apple has built a new Lockdown Mode into iOS 16, its iPhone software update due to arrive later in 2022, and into its upcoming MacOS Ventura.

The US government is one of the most powerful forces unleashed against Pegasus — even though the CIA and FBI were Pegasus customers, as reported by The New York Times in January. The US Justice Department has launched a criminal investigation, The Guardian said in February, after a whistleblower said NSO Group offered "bags of cash" for sensitive mobile phone data from a US tech firm, Mobileum. The spyware was found on the phones of at least nine State Department officials who were either based in Uganda or involved in matters associated with the African country, Reuters and The New York Times reported in December. 

Pegasus is the latest example of how vulnerable we all are to digital prying. Our phones store our most personal information, including photos, text messages and emails. Spyware can reveal directly what's going on in our lives, bypassing the encryption that protects data sent over the internet.

Pegasus has been a politically explosive issue that's put Israel under pressure from activists and from governments worried about misuse of the software. In November, the US federal government took much stronger action, blocking sale of US technology to NSO by putting the company on the government's Entity List. NSO has suspended some countries' Pegasus privileges but has sought to defend its software and the controls it tries to place on its use. NSO Group didn't respond to a request for comment, and the Justice Department declined to comment.

Here's what you need to know about Pegasus.

What is NSO Group?

It's an Israel-based company that licenses surveillance software to government agencies. The company says its Pegasus software provides a valuable service because encryption technology has allowed criminals and terrorists to go "dark." The software runs secretly on smartphones, shedding light on what their owners are doing. Other companies provide similar software.

Hulio co-founded the company in 2010. NSO also offers other tools that locate where a phone is being used, defend against drones and mine law enforcement data to spot patterns.

NSO has been implicated by previous reports and lawsuits in other hacks, including a reported hack of Amazon founder Jeff Bezos in 2018. A Saudi dissident sued the company in 2018 for its alleged role in hacking a device belonging to journalist Jamal Khashoggi, who had been murdered inside the Saudi embassy in Turkey that year.

New Yorker coverage details some of NSO Group's inner workings, including its argument that Pegasus is similar to military equipment that countries routinely sell to other countries, the company's tight ties to the Israeli government and its recent financial difficulties. It also revealed that NSO employees posted on the wall a detailed Google analysis of one Pegasus attack mechanism that concludes its NSO's abilities "rival those previously thought to be accessible to only a handful of nation states."

In the case of the Thai activists, NSO Group didn't comment specifically but told the Washington Post, "Politically motivated organizations continue to make unverifiable claims against NSO."

What is Pegasus?

Pegasus is NSO's best-known product. It can be installed remotely without a surveillance target ever having to open a document or website link, according to The Washington Post. Pegasus reveals all to the NSO customers who control it — text messages, photos, emails, videos, contact lists — and can record phone calls. It can also secretly turn on a phone's microphone and cameras to create new recordings, The Washington Post said.

General security practices like updating your software and using two-factor authentication can help keep mainstream hackers at bay, but protection is really hard when expert, well-funded attackers concentrate their resources on an individual. And Pegasus installations have employed "zero click" attacks that take advantage of vulnerabilities in software like Apple Messages or Meta's WhatsApp to silently install software. 

Pegasus isn't supposed to be used to go after activists, journalists and politicians. "NSO Group licenses its products only to government intelligence and law enforcement agencies for the sole purpose of preventing and investigating terror and serious crime," the company says on its website. "Our vetting process goes beyond legal and regulatory requirements to ensure the lawful use of our technology as designed."

Human rights group Amnesty International, however, documents in detail how it traced compromised smartphones to NSO Group. Citizen Lab said it independently validated Amnesty International's conclusions after examining phone backup data and since 2021 has expanded its Pegasus investigations.

In September, though, Apple fixed a security hole that Pegasus exploited for installation on iPhones. Malware often uses collections of such vulnerabilities to gain a foothold on a device and then expand privileges to become more powerful. NSO Group's software also runs on Android phones.

Why is Pegasus in the news?

Forbidden Stories, a Paris journalism nonprofit, and Amnesty International, a human rights group, shared with 17 news organizations a list of more than 50,000 phone numbers for people believed to be of interest to NSO customers.

The news sites confirmed the identities of many of the individuals on the list and infections on their phones. Of data from 67 phones on the list, 37 exhibited signs of Pegasus installation or attempted installation, according to The Washington Post. Of those 37 phones, 34 were Apple iPhones.

The list of 50,000 phone numbers included 10 prime ministers, three presidents and a king, according to an international investigation released in mid-July by The Washington Post and other media outlets, though there's no proof that being on the list means an NSO attack was attempted or successful.

The episode hasn't helped Apple's reputation when it comes to device security. "We take any attack on our users very seriously," Federighi said. The company said it'll donate $10 million and any damages from the lawsuit to organizations that are advocating for privacy and are pursuing research on online surveillance. That's a drop in the bucket for Apple, which reported a profit of $20.5 billion for its most recent quarter, but it can be significant for much smaller organizations, like Citizen Lab.

Whose phones did Pegasus infect?

In April, Citizen Lab also revealed that Pegasus infected the phones of at least 51 people in the Catalonia region of Spain. NSO Group Chief Executive Shalev Hulio told The New Yorker, which covered the hacks in depth, that Spain has procedures to ensure such use is legal, but Citizen Lab said Pegasus attacks targeted the phone of Jordi Solé, a pro-independence member of the European Parliament, digital security researcher Elies Campo and Campo's parents, according to the New Yorker. Catalonia is seeking political independence from Spain, but Spanish police have cracked down on the independence movement.

In addition to Mangin, two journalists at Hungarian investigative outlet Direkt36 had infected phones, The Guardian reported. 

A Pegasus attack was launched on the phone of Hanan Elatr, wife of murdered Saudi columnist Jamal Khashoggi, The Washington Post said, though it wasn't clear if the attack succeeded. But the spyware did make it onto the phone of Khashoggi's fiancee, Hatice Cengiz, shortly after his death.

Seven people in India were found with infected phones, including five journalists and one adviser to the opposition party critical of Prime Minister Narendra Modi, The Washington Post said.

And six people working for Palestinian human rights groups had Pegasus-infected phones, Citizen Lab reported in November.

What are the consequences of the Pegasus situation?

The US cut off NSO Group as a customer of US products, a serious move given that the company needs computer processors, phones and developer tools that often come from US companies. NSO "supplied spyware to foreign governments" that used it to maliciously target government officials, journalists, businesspeople, activists, academics and embassy workers. These tools have also enabled foreign governments to conduct transnational repression," the Commerce Department said.

Apple sued NSO Group  in November, seeking to bar the company's software from being used on Apple devices, require NSO to locate and delete any private data its app collected, and disclose the profits from the operations. "Private companies developing state-sponsored spyware have become even more dangerous," said Apple software chief Craig Federighi. That suit came after Meta's WhatsApp sued NSO Group in 2019.

French President Emmanuel Macron changed one of his mobile phone numbers and requested new security checks after his number appeared on the list of 50,000 numbers, Politico reported. He convened a national security meeting to discuss the issue. Macron also raised Pegasus concerns with Israeli Prime Minister Naftali Bennett, calling for the country to investigate NSO and Pegasus, The Guardian reported. The Israeli government must approve export licenses for Pegasus.

Israel created a review commission to look into the Pegasus situation. And on July 28, Israeli defense authorities inspected NSO offices in person.

European Commission chief Ursula von der Leyen said if the allegations are verified, that Pegasus use is "completely unacceptable." She added, "Freedom of media, free press is one of the core values of the EU."

The Nationalist Congress Party in India demanded an investigation of Pegasus use.

Edward Snowden, who in 2013 leaked information about US National Security Agency surveillance practices, called for a ban on spyware sales in an interview with The Guardian. He argued that such tools otherwise will soon be used to spy on millions of people. "When we're talking about something like an iPhone, they're all running the same software around the world. So if they find a way to hack one iPhone, they've found a way to hack all of them," Snowden said.

What does NSO have to say about this?

NSO acknowledges its software can be misused. It cut off two customers in recent 12 months because of concerns about human rights abuses, according to The Washington Post. "To date, NSO has rejected over US $300 million in sales opportunities as a result of its human rights review processes," the company said in a June transparency report.

However, NSO strongly challenges any link to the list of phone numbers. "There is no link between the 50,000 numbers to NSO Group or Pegasus," the company said in a statement.

"Every allegation about misuse of the system is concerning me," Hulio told the Post. "It violates the trust that we give customers. We are investigating every allegation."

In a statement, NSO denied "false claims" about Pegasus that it said were "based on misleading interpretation of leaked data." Pegasus "cannot be used to conduct cybersurveillance within the United States," the company added.

Regarding the alleged infection of State Department phones, NSO Group didn't immediately respond to a request for comment. But it told Reuters it canceled relevant accounts, is investigating, and will take legal action if it finds misuse.

NSO will try to reverse the US government's sanction. "We look forward to presenting the full information regarding how we have the world's most rigorous compliance and human rights programs that are based the American values we deeply share, which already resulted in multiple terminations of contacts with government agencies that misused our products," an NSO spokesperson said.

In the past, NSO had also blocked Saudi Arabia, Dubai in the United Arab Emirates and some Mexican government agencies from using the software, The Washington Post reported.

How can I tell if my phone has been infected?

Amnesty International released an open-source utility called MVT (Mobile Verification Toolkit) that's designed to detect traces of Pegasus. The software runs on a personal computer and analyzes data including backup files exported from an iPhone or Android phone.


Source

Tags:

Stalkerware: What To Do If You're The Target


Stalkerware what to do if you re the target principal name stalkerware what to do if you re the target store stalkerware what to do if you re the smartest person in the room stalkerware what to do if you really love stalkerware what to do if you remain stalkerware what to do if you re gone matchbox 20 stalkerware what to do if you remember
Stalkerware: What to do if you're the target


Stalkerware: What to do if you're the target

This article discusses domestic violence. CNET would like to remind readers that browsing histories, including this story, can be monitored and are impossible to completely clear. If you need help, please call the National Domestic Violence Hotline at 1-800-799-7233.

Things got weird at the end of Allie's relationship with her boyfriend. One night, he seemed to know where she'd been when she was out without him, and another night he started talking about something she'd recently read on her personal computer at home, where she lived alone. 

At the beginning of their relationship, he said he had cyberstalked a past girlfriend, but he assured her that those days were behind him. Now Allie, who asked to use a pseudonym out of concern for her safety, wondered if her soon-to-be-ex boyfriend was spying on her.

"I thought I was going nuts because I was pretty sure I hadn't shared that information," said Allie, who ditched her laptop and phone rather than find out what software her ex might have installed on them. "In hindsight, it was subtle intimidation."

The paranoia that Allie felt is becoming a sadly common experience. It's jaw-droppingly easy for someone to buy and install intrusive apps, known as stalkerware, on someone else's device. The apps are plentiful, according to antivirus software firms that track their prevalence. A recent Harris poll conducted with antivirus firm NortonLifeLock found that one in 10 people admit to using stalkerware to track a partner or ex-partner. The apps are so simple that some people on TikTok have posted 60-second tutorials on how to use them.

The software works on computers but has become especially powerful to use on phones, turning the gadgets into all-seeing surveillance devices that reveal location data as well as emails, web browsing histories and more. Stalkerware on smartphones can lead domestic abusers to partners who may be in hiding. The apps give heightened control to abusers whose partners haven't left, making escape harder to manage. Stalkerware apps have been tied to horrible acts of violence.

There can be legitimate reasons to use tracking apps, such as monitoring children's phones, or monitoring employees (with their consent). However, the distinction between these apps and what's often called stalkerware is blurry. Many apps bill themselves as legitimate monitoring apps but can offer staggering amounts of information from targets' phones and can operate completely undetected. The reality is that these apps get abused by people who spy on adults without their consent, according to law enforcement officials and to domestic-violence and legal experts. 

You might at some point worry you have stalkerware on your phone or laptop. It isn't easy to decide what to do about it, domestic-violence experts say, because your partner or ex might become more dangerous if you delete the software on your device. But there are steps you can take to learn more about the software and whether it's on your device.

What is stalkerware?

Stalkerware refers to a broad group of apps that someone else can install on your device to intercept texts and phone calls, access your location, log your web browsing activity and turn on your camera or microphone. The information gathered by such an app typically gets sent to a portal or companion app accessed by the person who installed the stalkerware. 

The apps can be installed on all kinds of phones, though it's a bit more complex to get stalkerware working on iPhones. The person installing stalkerware typically has to get physical access to the user's phone to install an app. A big exception to this is if the person installing stalkerware has the target's iCloud credentials, allowing them to access backups of the other person's phone.

Is stalkerware illegal?

Surreptitious spying on your devices without your consent is illegal. So is stalking. Additionally, the apps usually violate the policies for apps sold on stores run by Google and Apple, and they're frequently taken down from those stores.

People still install them on other people's phones, though, finding the apps for sale on the app makers' websites instead of an app store, and at times undermining the foundational security of a target's phone by jailbreaking it. The apps are often sold as child or employee monitoring services, but they're ripe for abuse because they can run undetected on a device, say law enforcement officials and domestic-violence experts.

There have been prosecutions of people who used stalkerware, but they're uncommon. 

How do I know if my phone has stalkerware?

That can be hard. The software often disguises itself, either by displaying an innocuous icon (like a battery monitor), or by not displaying an icon at all, says Kevin Roundy, technical director at the NortonLifeLock research group.

While researching stalkerware apps, Roundy identified other categories of apps that often work in concert with the intrusive software. One of these is an app-hiding app, which can remove the icon of a stalkerware app from your screen.

Even if an app's icon is hidden on your phone, it should show up in your settings as an item in the list of applications running on your device. The app still probably won't have a label that immediately identifies it as stalkerware, Roundy says, so look for any app you don't recognize. You can look up any unusual looking apps online on another device to see if you can find more information about them.

An additional step is using antivirus software on your phone, if you use an Android device. (There isn't any antivirus software available for iPhones.) Antivirus software from Kaspersky, Malwarebytes and NortonLifeLock all scan for the software and warn users if they find known stalkerware apps.

You can also take your device to a local police department. Resources and training vary from place to place, so it's not guaranteed that someone will be able to help you. Still, some departments have officers who specialize in domestic violence and have training in scanning devices for software, and they may be able to assist.

Should I delete stalkerware?

Deleting the app is an option to consider, but you should make the decision carefully. Deleting stalkerware apps might put you in even more danger if it prompts your partner or ex to engage in even scarier behavior.

Erica Olsen, who directs the safety net project at the National Network to End Domestic Violence, says deleting the app sends a message to the person who installed it: I know you did this, and now you don't have control over my device anymore. The loss of control, and the fear that they might be held accountable for installing stalkerware, can lead some people to "escalate the violence, or change stealth stalking to an assault," Olsen said.

These concerns are why multiple antivirus companies don't automatically delete stalkerware from their users' phones. 

"The decision has to be theirs," Tara Hairston, Kaspersky's head of government relations for North America, said of targets of stalkerware, "because there is unfortunately that risk."

How to delete, destroy or replace

You may decide any risk is worth deleting the app. In that case, there are a few routes you can take.

First, you can cut off the app's access to things like your camera and microphone, and then delete it from your phone. This process can vary, and guides for deleting specific apps exist online, sometimes even on the app-makers' websites. Deletion is the least disruptive route you can take, but it can leave you with lingering questions of whether there's anything left on your phone that can spy on you.

If you still aren't comfortable that your device is secure, you can do a factory reset. This restores your phone to the state you'd find it when it was fresh out of the box. You'll be signed out of all your accounts, and all the extra apps installed on your phone after purchase will be gone. Before you do a factory reset, it's important to back up any photos or files that you don't already have saved somewhere else.

Lastly, you can get a new device. This is a tough piece of advice for anyone to hear, especially if your finances are tight or your partner controls your spending. Still, that's what Allie says she decided to do. 

She didn't know if she'd be able to get rid of whatever software might be on her phone or computer, and she didn't think she'd be able to learn more than her former partner knew about hacking. She stopped using her devices and got new ones.

"I just wanted this guy out of my life," she said.


Source

Search This Blog

Menu Halaman Statis

close