• About
  • Advertise
  • Careers
  • Contact Us
Saturday, June 14, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
ADVERTISEMENT
Home Business Security

Does Lockdown Mode Equal Security?

by Peter Oluka
July 11, 2022
in Security
1
UBA
Advertisements

Recently Apple announced its new ‘Lockdown Mode’. It’s aimed at protecting users who may be at risk of highly targeted cyberattacks from private companies developing state-sponsored mercenary spyware.

The most significant recent case of such an attack was highlighted by Guardian research from 2021.

The report suggests that over 30,000 human rights activists, journalists and lawyers across the world may have been targeted using a hacking software known as Pegasus, created by the NSO Group.

Here, Victor Chebyshev, Lead Security Researcher at Kaspersky, considers if Apple’s new secure mode will be an effective defense against programs such as Pegasus? And he discusses what else can people do to mitigate the risks of being infected by target attacks.

Is Lockdown Mode safe?

Lockdown Mode is made up of an extremely useful set of functions, and it is relevant to all Internet users, not just high-ranking officials, activists or journalists. This setting is also helpful to anyone who suspects that they are being digitally followed.

However, people should not be under the illusion that after activating Lockdown Mode their device will be completely secure.

Although it is important to acknowledge it will become more difficult to attack such a gadget. As a result, the prices for zero-day vulnerabilities for the iOS platform will increase.

Nonetheless, as long as a device is in working condition, it is possible for it to be tracked without the need for expensive spyware like NSO Group’s Pegasus. Basic surveillance can be carried out at the base station of a cellular operator, for example.

Or using other equipment that a potential target owns, such as an AirTag or AirPods, connected through the FindMy ecosystem. Through this system, attackers can also access device data, including photos.

How can people protect themselves?

In order to completely protect themselves, people should turn off their device and place it in a Faraday cage.

In such a situation, it is then obviously impossible to use the gadget, but any other mode is still a compromise between security and everyday functions. Yes, with such modes, hacking is more difficult, but it cannot be ruled out entirely.

It should be remembered that threats such as Pegasus are often primarily focused on recording conversations with the victim, including communications in instant messengers.

It is likely that with Lockdown Mode enabled a device will be less likely to be infected by Pegasus.

As a result, the attack vector will shift from the end device towards the corresponding infrastructure: messenger servers or the personnel servicing them.

To mitigate the risks of being infected by programs like Pegasus, Kaspersky recommends that users:

  • Reboot the device daily – Regular reboots of the device can be effective against attacks, relying on zero-click zero-days with no persistence (like Pegasus). If a person resets their gadget every day, the intruder will have to re-infect it over and over again.
  • Turn off iMessage – The message app is a built-in service in iOS and is enabled by default, which is the best delivery mechanism for zero-click chains. That makes this messenger pretty attractive to intruders.
  • Don’t click on links received in messages – Sometimes zero-click zero-day chains can be delivered through a message, such as SMS, email or messenger app. The safest option to open links from interesting messages is to use a desktop computer, preferably using the TOR Browser, or better yet using a secure non-persistent OS such as Tails.
  • Use a VPN to cover traffic – Some exploits are delivered via MitM’s GSM attacks, while browsing HTTP sites, or hijacking DNS. Using a reliable VPN solution to mask someone’s traffic makes it harder for a GSM carrier to target them directly over the Internet. It also complicates the targeting process if attackers control people’s data flow, for example while roaming.

Loading

Advertisements
MTN ADS

Author

  • Peter Oluka
    Peter Oluka

    Peter Oluka (@peterolukai), editor of Techeconomy, is a multi-award winner practicing Journalist. Peter’s media practice cuts across Media Relations | Marketing| Advertising, other Communications interests. Contact: peter.oluka@techeconomy.ng

    View all posts
0Shares
Tags: appleiphoneLockdown mood
Peter Oluka

Peter Oluka

Peter Oluka (@peterolukai), editor of Techeconomy, is a multi-award winner practicing Journalist. Peter’s media practice cuts across Media Relations | Marketing| Advertising, other Communications interests. Contact: peter.oluka@techeconomy.ng

Next Post

Apply: WFF Startup Innovation Awards for Agrifood Startups 

Comments 1

  1. Pingback: Does Lockdown Mode Equal Security? – TechEconomy.ng | Scam Buzz

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

Bolt Scheduled Rides

New Bolt Features Allow Port Harcourt Riders Book Trips in Advance

1 year ago
Nnamdi Uba, Sytemap’s CEO

Sytemap Unveils Historic Initiative to Empower Women via Land Ownership

6 months ago

Popular News

    Connect with us

    Currently Playing

    TE Weather

    TE PODCAST

    Techeconomy Podcast
    Techeconomy Podcast

    Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

    Follow us @techeconomyng for more.

    Listen OnSpotify
    TECH TALK EPISODE 2
    byTecheconomy

    PRODUCTIVITY AND WORK-Life Balance

    TECH TALK EPISODE 2
    Episode play icon
    TECH TALK EPISODE 2
    Episode Description
    Episode play icon
    CYBERSECURITY ESSENTIALS
    Episode Description
    Episode play icon
    Digital Marketing Trends and strategies for 2025 and beyond
    Episode Description
    Episode play icon
    Major Lesson for Techies in 2024 and Projections for 2025
    Episode Description
    Episode play icon
    Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
    Episode play icon
    Maximizing Profitability Through Seasonal Sales: Strategies For Success
    Episode play icon
    Techeconomy Business Series
    Episode Description
    Episode play icon
    PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
    Episode Description
    Episode play icon
    Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
    Episode Description
    Episode play icon
    The Role of Ed-tech in Life Long Learning and Continuous Education
    Episode Description
    Search Results placeholder
    • About
    • Advertise
    • Careers
    • Contact Us

    © 2017 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Mobility
      • Environment
      • Travel
      • StartUPs
    • Economy
    • TECHECONOMY TV
    • TBS
    • About Us
    • Contact Us

    © 2017 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »