i✌️erify (@ismyphonehacked) 's Twitter Profile
i✌️erify

@ismyphonehacked

Secure your phone with iVerify.

ID: 322912417

linkhttps://www.iverify.io calendar_today23-06-2011 23:21:29

334 Tweet

1,1K Followers

43 Following

Ben Goggin (@benjamingoggin) 's Twitter Profile Photo

NEW: The Harris-Walz campaign may have been the victim of an iPhone hacking campaign that targeted five high-profile Americans Cybersecurity company iVerify says evidence suggests a novel hack that targeted politicians, people in media, and AI. nbcnews.com/tech/security/…

SC Media (@scmagazine) 's Twitter Profile Photo

Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to i✌️erify. #cybersecurity #infosec #ITsecurity bit.ly/43ZUAfD

SC Media (@scmagazine) 's Twitter Profile Photo

Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to i✌️erify. #cybersecurity #infosec #ITsecurity bit.ly/43ZUAfD

SC Media (@scmagazine) 's Twitter Profile Photo

Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to i✌️erify. #cybersecurity #infosec #ITsecurity bit.ly/43ZUAfD

SC Media (@scmagazine) 's Twitter Profile Photo

Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to i✌️erify. #cybersecurity #infosec #ITsecurity bit.ly/43ZUAfD

SC Media (@scmagazine) 's Twitter Profile Photo

Smartphones are prime targets for exploitation, regardless of which encrypted app is installed or whether official business gets discussed, says i✌️erify's Rocky Cole in this commentary. #cybersecurity #infosec #ITsecurity bit.ly/4kqUvXv

SC Media (@scmagazine) 's Twitter Profile Photo

Smartphones are prime targets for exploitation, regardless of which encrypted app is installed or whether official business gets discussed, says i✌️erify's Rocky Cole in this commentary. #cybersecurity #infosec #ITsecurity bit.ly/4kqUvXv

SC Media (@scmagazine) 's Twitter Profile Photo

Smartphones are prime targets for exploitation, regardless of which encrypted app is installed or whether official business gets discussed, says i✌️erify's Rocky Cole in this commentary. #cybersecurity #infosec #ITsecurity bit.ly/4kqUvXv

#BSidesNYC (@bsidesnyc) 's Twitter Profile Photo

BSidesNYC welcomes i✌️erify as a kilobit sponsor for our Oct 18, 2025, conference. bsidesnyc.org iVerify protects every phone in the workplace from the actual threats they face. iverify.io

BSidesNYC welcomes <a href="/IsMyPhoneHacked/">i✌️erify</a> as a kilobit sponsor for our Oct 18, 2025, conference. bsidesnyc.org iVerify protects every phone in the workplace from the actual threats they face. iverify.io
Doc Dave (@forensicdave) 's Twitter Profile Photo

Sarah (Sarah Edwards 👩🏻‍💻🐈‍⬛) from i✌️erify is a regular at #OBTS - as well as helping with the awesome #CTF this year she gave a super forensicator talk about the Golden Power of Apple’s Juicy Powerlogs - recommend watching!

Sarah (<a href="/iamevltwin/">Sarah Edwards 👩🏻‍💻🐈‍⬛</a>) from <a href="/IsMyPhoneHacked/">i✌️erify</a>  is a regular at #OBTS - as well as helping with the awesome #CTF this year she gave a super forensicator talk about the Golden Power of Apple’s Juicy Powerlogs - recommend watching!
Doc Dave (@forensicdave) 's Twitter Profile Photo

Matthais (@helthydriver)/iVerify(i✌️erify)/Dreams of (security.apple.com/research-devic…) - spoke at #OBTS about Hunting iOS malware - flipping the script using Malware Simulation - building fake spyware to reveal real forensic clues! Also an interesting site mythicalbeasts.dfrlab.org

Matthais (@helthydriver)/iVerify(<a href="/IsMyPhoneHacked/">i✌️erify</a>)/Dreams of (security.apple.com/research-devic…) - spoke at #OBTS about Hunting iOS malware - flipping the script using Malware Simulation - building fake spyware to reveal real forensic clues! Also an interesting site mythicalbeasts.dfrlab.org