<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>iPhone</title>
	<atom:link href="https://axisofeasy.com/tag/iphone/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Wed, 14 May 2025 23:22:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>iPhone</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 399: Hackers Break Into Government Messaging App And Steal Sensitive Data</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/?pk_campaign=feed&#038;pk_kwd=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/?pk_campaign=feed&#038;pk_kwd=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 09 May 2025 22:00:58 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account suspension]]></category>
		<category><![CDATA[AI app]]></category>
		<category><![CDATA[AI moderation]]></category>
		<category><![CDATA[AirBorne]]></category>
		<category><![CDATA[AirPlay]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Apple devices]]></category>
		<category><![CDATA[Arctic Wolf Labs]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[business data leak]]></category>
		<category><![CDATA[CarPlay]]></category>
		<category><![CDATA[chat archive]]></category>
		<category><![CDATA[ClickFunnels]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[ComfyUI_LLMVISION]]></category>
		<category><![CDATA[content bans]]></category>
		<category><![CDATA[Customs and Border Protection]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Discord server]]></category>
		<category><![CDATA[Disney hack]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[federal charges]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[HR scam]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware spread]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Mike Waltz]]></category>
		<category><![CDATA[More_eggs]]></category>
		<category><![CDATA[NordPass]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[Oligo]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pinterest]]></category>
		<category><![CDATA[public Wi-Fi]]></category>
		<category><![CDATA[reddit]]></category>
		<category><![CDATA[router security]]></category>
		<category><![CDATA[Scotiabank]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[Smarsh]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[TeleMessage]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[U.S. Government]]></category>
		<category><![CDATA[Venom Spider]]></category>
		<category><![CDATA[vpnMentor]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X (Twitter)]]></category>
		<category><![CDATA[Zero-click]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31515</guid>

					<description><![CDATA[Hackers Break Into Government Messaging App and Steal Sensitive Data,
Hackers Are Tricking Recruiters With Fake Resumes and It’s Working, 
Disney Hacker Used Fake AI App to Steal Over 1TB of Secrets... this and more in AofE  #399<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data&amp;action_name=%23AxisOfEasy%20399%3A%20Hackers%20Break%20Into%20Government%20Messaging%20App%20And%20Steal%20Sensitive%20Data&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/?pk_campaign=feed&#038;pk_kwd=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 282: California&#8217;s Unprecedented Data Breach Highlights Need For Privacy In Public Safety</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/?pk_campaign=feed&#038;pk_kwd=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/?pk_campaign=feed&#038;pk_kwd=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 24 Jan 2023 23:00:18 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Arizona]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[BackdoorDiplomacy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[CAlifornia]]></category>
		<category><![CDATA[Chat GPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[DNV]]></category>
		<category><![CDATA[easyPress]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[mastodon]]></category>
		<category><![CDATA[Nostr]]></category>
		<category><![CDATA[SweepWizard]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[WordFence]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=27163</guid>

					<description><![CDATA[California's unprecedented data breach highlights need for privacy In public safety,
Apple's scanning: Consent from current &#038; future iPhone owners required by law,
New BackdoorDiplomacy attacks on Iranian government entities....  this and more in AofE  #282<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety&amp;action_name=%23AxisOfEasy%20282%3A%20California%26%238217%3Bs%20Unprecedented%20Data%20Breach%20Highlights%20Need%20For%20Privacy%20In%20Public%20Safety&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/?pk_campaign=feed&#038;pk_kwd=axisofeasy-282-californias-unprecedented-data-breach-highlights-need-for-privacy-in-public-safety/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 270: TechCrunch’s Analysis Of TheTruthSpy And The State Of Other Stalkerware Apps</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps/?pk_campaign=feed&#038;pk_kwd=axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps/?pk_campaign=feed&#038;pk_kwd=axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 22:00:03 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Atlassian]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[Dong He]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[GAO]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Kurdish]]></category>
		<category><![CDATA[Mark Sokolovsky]]></category>
		<category><![CDATA[MxSpy]]></category>
		<category><![CDATA[NYP]]></category>
		<category><![CDATA[Predictwise]]></category>
		<category><![CDATA[Raccoon InfoStealer]]></category>
		<category><![CDATA[RAT]]></category>
		<category><![CDATA[RomCom]]></category>
		<category><![CDATA[Stalkerware]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[TheTruthSpy]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26678</guid>

					<description><![CDATA[TechCrunch’s Analysis of TheTruthSpy and the State of other Stalkerware Apps,
Mark Sokolovsky, Alleged 26-year-old Behind Global “Raccoon InfoStealer” Malware, Charged by FBI,
Project Texas: How TikTok Responds to Its First Big Crisis... this and more in AofE  #270<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps&amp;action_name=%23AxisOfEasy%20270%3A%20TechCrunch%E2%80%99s%20Analysis%20Of%20TheTruthSpy%20And%20The%20State%20Of%20Other%20Stalkerware%20Apps&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps/?pk_campaign=feed&#038;pk_kwd=axisofeasy-270-techcrunchs-analysis-of-thetruthspy-and-the-state-of-other-stalkerware-apps/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 225:  Threat Actors Exploit The Second Log4j Vulnerability As A Third Flaw Is Discovered</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/?pk_campaign=feed&#038;pk_kwd=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/?pk_campaign=feed&#038;pk_kwd=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 21 Dec 2021 23:00:19 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Binance]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Log4j]]></category>
		<category><![CDATA[NSO]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Pingdom]]></category>
		<category><![CDATA[PseudoManuscrypt]]></category>
		<category><![CDATA[SIM]]></category>
		<category><![CDATA[Wire Fraud]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=25150</guid>

					<description><![CDATA[63,000 websites suffer outages as users report issues with the AWS,
Apple sues NSO Group, putting the organization in financial trouble,
Threat actors exploit the second Log4j vulnerability as a third flaw is discovered...this and more in Axis of Easy 225.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered&amp;action_name=%23AxisOfEasy%20225%3A%20%20Threat%20Actors%20Exploit%20The%20Second%20Log4j%20Vulnerability%20As%20A%20Third%20Flaw%20Is%20Discovered&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/?pk_campaign=feed&#038;pk_kwd=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 217: Hackers Were Able To Get Microsoft&#8217;s Digital Signature On Their Rootkit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 26 Oct 2021 22:00:09 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Brave]]></category>
		<category><![CDATA[Celtics]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Echohealth]]></category>
		<category><![CDATA[Gain of Function]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[NBA]]></category>
		<category><![CDATA[NIH]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[Wuhan]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=24893</guid>

					<description><![CDATA[Brave browser ditches Google in favor of its own privacy-centered search engine,
Several US agencies issued joint cybersecurity advisory about cyber threats to water facilities,
App Sideloading: Apple compares iPhone Security to Android Malware Stats...this and more in Axis of Easy # 217<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit&amp;action_name=%23AxisOfEasy%20217%3A%20Hackers%20Were%20Able%20To%20Get%20Microsoft%26%238217%3Bs%20Digital%20Signature%20On%20Their%20Rootkit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-217-hackers-were-able-to-get-microsofts-digital-signature-on-their-rootkit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 140: Let&#8217;s Make This Simple: Zoom is Malware</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-140-lets-make-this-simple-zoom-is-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-140-lets-make-this-simple-zoom-is-malware</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-140-lets-make-this-simple-zoom-is-malware/#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 02:13:16 +0000</pubDate>
				<category><![CDATA[0-day]]></category>
		<category><![CDATA[BGP Leaks]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Internet Society Canada Chapter]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[NSO Software]]></category>
		<category><![CDATA[Rostelecom]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">http://axisofeasy.com/?post_type=podcast&#038;p=20865</guid>

					<description><![CDATA[Big Tech jumping into red hot Coronavirus surveillance market Let’s Make This Simple: Zoom is Malware A caution to governments about cell phone tracking during pandemic Hacker finds seven 0-day exploits in iPhone camera Facebook tried to use NSO spyware to surveil users VPNs are notorious for tracking your browsing habits Update on the easyDNS [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-140-lets-make-this-simple-zoom-is-malware%2F&amp;action_name=%23AxisOfEasy%20140%3A%20Let%26%238217%3Bs%20Make%20This%20Simple%3A%20Zoom%20is%20Malware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-140-lets-make-this-simple-zoom-is-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
