{"id":38554,"date":"2020-12-02T16:42:43","date_gmt":"2020-12-02T16:42:43","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31812\/Watch-This-Google-Hacker-Pwn-26-iPhones.html"},"modified":"2020-12-02T16:42:43","modified_gmt":"2020-12-02T16:42:43","slug":"watch-this-google-hacker-pwn-26-iphones","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/","title":{"rendered":"Watch This Google Hacker Pwn 26 iPhones"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/\/articles\/5fc6d75a2595cf0097ce0d63\/lede\/1606867064505-screen-shot-2020-12-01-at-65720-pm.png?image-resize-opts=Y3JvcD0xeHc6MC45OTk0NzkxNjY2NjY2NjY3eGg7Y2VudGVyLGNlbnRlciZyZXNpemU9MTIwMDoqJnJlc2l6ZT0xMjAwOio\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>During the bubonic plague in the 16th century, William Shakespeare wrote King Lear. This year, enduring months of COVID-19 quarantine, I played at least 200 hours of <em>Death Stranding<\/em>, <em>Breath of the Wild<\/em>, and <em>Call of Duty: Warzone<\/em> combined.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>Meanwhile, Ian Beer, one of the best hackers on the planet, found a way to hack and take full control of any nearby iPhone with what many in the security industry believe is one of the most impressive iPhone hacks ever.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36.382252559727\"><\/p>\n<p>&#8220;For 6 months of 2020, while locked down in the corner of my bedroom surrounded by my lovely, screaming children, I&#8217;ve been working on a magic spell of my own,&#8221; Beer, who works for <a href=\"https:\/\/www.vice.com\/en\/article\/59nyqb\/how-google-changed-the-secretive-market-for-the-most-dangerous-hacks-in-the-world\" target=\"_blank\" rel=\"noopener noreferrer\">the Google elite hacking team Project Zero<\/a>, wrote in <a href=\"https:\/\/googleprojectzero.blogspot.com\/2020\/12\/an-ios-zero-click-radio-proximity.html\" target=\"_blank\" rel=\"noopener noreferrer\">a blog post<\/a>. &#8220;No, sadly not an incantation to convince the kids to sleep in until 9am every morning, but instead a wormable radio-proximity exploit which allows me to gain complete control over any iPhone in my vicinity. View all the photos, read all the email, copy all the private messages and monitor everything which happens on there in real-time.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37\"><\/p>\n<p>Beer was able to develop a technique to send an exploit via WiFi that requires no user interaction at all, and doesn&#8217;t even need the target to be connected to the internet. In other words, if your iPhone was in range of someone with this capability, they could take it over without requiring you to click on a dodgy link or anything like that. What&#8217;s worse, Beer&#8217;s exploit could have been made into a worm, meaning it could propagate to nearby iPhones automatically, spreading exponentially, kind of like\u2014if you&#8217;ll allow me the cringey metaphor\u2014a cyber coronavirus.&nbsp;<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--pullquote\" readability=\"13.217391304348\">\n<p><em><strong>Do you research and develop exploits for iPhones, Android phones, or other software? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, on Wickr at lorenzofb, OTR chat at lorenzofb@jabber.ccc.de, or email<\/strong><\/em> <a href=\"mailto:lorenzofb@vice.com\">lorenzofb@vice.com<\/a><em><strong>.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>Chris Evans, Project Zero&#8217;s original team leader, wrote that &#8220;there&#8217;s something hauntingly beautiful watching all these iPhones die at slightly different times, as they get a WiFi broadcast packet of death.&#8221;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>And there truly is, just take a look at the short video above, or a longer version below, which Beer made himself to showcase how his exploit works.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28.8\"><\/p>\n<p>Dan Goodin, one of the most experienced cybersecurity reporters on the planet, <a href=\"https:\/\/arstechnica.com\/gadgets\/2020\/12\/iphone-zero-click-wi-fi-exploit-is-one-of-the-most-breathtaking-hacks-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">called<\/a> it &#8220;one of the most breathtaking iPhone vulnerabilities ever.&#8221;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>The bugs that Beer found to develop this exploit chain have all been patched since iOS 13.5, released in May of this year. But as Beer wrote in his post, the takeaway here should be that &#8220;one person, working alone in their bedroom, was able to build a capability which would allow them to seriously compromise iPhone users they&#8217;d come into close contact with.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.162162162162\"><\/p>\n<p>Other than being spectacular, this vulnerability could actually have real world applications. <a href=\"https:\/\/twitter.com\/RayRedacted\/status\/1334118124392681472\" target=\"_blank\" rel=\"noopener noreferrer\">According to a cybersecurity expert<\/a> that just goes by Ray Redacted, it&#8217;s possible &#8220;this exploit could be used to unlock like 90 percent of the phones currently in custody at police departments across the USA,&#8221; given that those run older versions of iOS which still run code that contains the bugs found by Beer.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.692607003891\"><\/p>\n<p>Of course, developing something like this takes time, and incredible expertise. But Beer showed that with just a Raspberry Pi, off-the-shelf WiFi adaptors <a href=\"https:\/\/twitter.com\/i41nbeer\/status\/1333884910956900352\" target=\"_blank\" rel=\"noopener noreferrer\">that cost a total of $100<\/a>, and a few lines of code, he could have hacked anyone within a few meters.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31.506787330317\"><\/p>\n<p>Beer challenged Apple, <a href=\"https:\/\/www.vice.com\/en\/article\/7xqdxe\/google-project-zero-hacker-iphone-bug-bounty\" target=\"_blank\" rel=\"noopener noreferrer\">once again<\/a>, to qualify the bugs he found for the company&#8217;s bug bounty. Beer wrote on Twitter that these bugs could&#8217;ve been worth $500,000, and he&#8217;d love for Apple to donate the money to a charity.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"21.176470588235\"><\/p>\n<p>Congratulations to Beer for his future <a href=\"https:\/\/pwnies.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pwnie Award<\/a>.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/span>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31812\/Watch-This-Google-Hacker-Pwn-26-iPhones.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38555,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9081],"class_list":["post-38554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinephoneflawgoogleapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Watch This Google Hacker Pwn 26 iPhones 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watch This Google Hacker Pwn 26 iPhones 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-02T16:42:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/watch-this-google-hacker-pwn-26-iphones.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"674\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Watch This Google Hacker Pwn 26 iPhones\",\"datePublished\":\"2020-12-02T16:42:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/\"},\"wordCount\":656,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/watch-this-google-hacker-pwn-26-iphones.jpg\",\"keywords\":[\"headline,phone,flaw,google,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/\",\"name\":\"Watch This Google Hacker Pwn 26 iPhones 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/watch-this-google-hacker-pwn-26-iphones.jpg\",\"datePublished\":\"2020-12-02T16:42:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/watch-this-google-hacker-pwn-26-iphones.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/watch-this-google-hacker-pwn-26-iphones.jpg\",\"width\":1200,\"height\":674},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/watch-this-google-hacker-pwn-26-iphones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,flaw,google,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephoneflawgoogleapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Watch This Google Hacker Pwn 26 iPhones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Watch This Google Hacker Pwn 26 iPhones 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/","og_locale":"en_US","og_type":"article","og_title":"Watch This Google Hacker Pwn 26 iPhones 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-02T16:42:43+00:00","og_image":[{"width":1200,"height":674,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/watch-this-google-hacker-pwn-26-iphones.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Watch This Google Hacker Pwn 26 iPhones","datePublished":"2020-12-02T16:42:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/"},"wordCount":656,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/watch-this-google-hacker-pwn-26-iphones.jpg","keywords":["headline,phone,flaw,google,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/","url":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/","name":"Watch This Google Hacker Pwn 26 iPhones 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/watch-this-google-hacker-pwn-26-iphones.jpg","datePublished":"2020-12-02T16:42:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/watch-this-google-hacker-pwn-26-iphones.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/watch-this-google-hacker-pwn-26-iphones.jpg","width":1200,"height":674},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/watch-this-google-hacker-pwn-26-iphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,flaw,google,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephoneflawgoogleapple\/"},{"@type":"ListItem","position":3,"name":"Watch This Google Hacker Pwn 26 iPhones"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38554"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38554\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38555"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}