Hackers bypass security by using falsified Apple Developer IDs and fake PDF files. Experts advise crypto users to be vigilant ...