Security News > 2022 > September > Apple releasing iOS 16 with Lockdown, Safety Check security features

Apple is releasing iOS 16 today with new features to boost iPhone users' security and privacy, including Lockdown Mode and Security Check.
As Apple said in July when it first unveiled it, the Lockdown Mode security feature is not meant for everyday usage but, instead, designed to defend high-risk individuals from targeted attacks with mercenary spyware.
"Turning on Lockdown Mode in iOS 16, iPadOS 16, and macOS Ventura further hardens device defenses and strictly limits certain functionalities, sharply reducing the attack surface that potentially could be exploited by highly targeted mercenary spyware," Apple said.
These new security and privacy-focused iOS features align with Apple's ongoing efforts to defend their customers from spyware attacks and boost the operating system's privacy protection capabilities.
The company has also announced new Apple Security Bounty categories to provide security researchers with monetary rewards for finding and helping close down security bugs that could be used to workaround Lockdown Mode defenses.
"To invite feedback and collaboration from the security research community, Apple has also established a new category within the Apple Security Bounty program to reward researchers who find Lockdown Mode bypasses and help improve its protections," Apple said in July.
News URL
Related news
- DeepSeek's iOS app is a security nightmare, and that's before you consider its TikTok links (source)
- Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update (source)
- iOS 18 settings to lock down your privacy and security (source)
- Global Pressure Mounts for Apple as Brazilian Court Demands iOS Sideloading Within 90 Days (source)
- Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices (source)
- Apple Rolls Out iOS 18.4 With New Languages, Emojis & Apple Intelligence in the EU (source)
- Still Using an Older Version of iOS or iPadOS? Update Now to Patch These Critical Security Vulnerabilities (source)