article thumbnail

What is Hermit spyware and how do you protect yourself from it?

Mashable VR

On Apple devices, attackers used flaws in the company's protocols to distribute apps that can bypass the App Store but be subject to the same security enforcement mechanisms. TAG has only seen them in action in two countries, Italy and Kazakhstan (Lookout also adds Syria to that list). Credit: Google TAG.