All a hacker needed for the exploit was to be within Wi-Fi range of a person’s iPhone. James Martin/CNET Apple had a security vulnerability that
All a hacker needed for the exploit was to be within Wi-Fi range of a person’s iPhone. James Martin/CNET Apple had a security vulnerability that