Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.