![]() On Thursday evening, Google's Project Zero security research team revealed a broad campaign of iPhone hacking. And they've indiscriminately hacked thousands of iPhones just by getting them to visit a website. ![]() But a discovery by a group of Google researchers has turned that notion on its head: For two years, someone has been exploiting a rich collection of iPhone vulnerabilities with anything but restraint or careful targeting. I have reached out to Apple for a comment and will update this post when/if I receive a response.Hacking the iPhone has long been considered a rarified endeavor, undertaken by sophisticated nation-states against only their most high-value targets. I encourage people to use Signal, an encrypted messaging app, so that if a hacker makes it in, there won’t be much to find.” “Now, I limit the information I keep on my phone. “As long as we store our lives on devices that have vulnerabilities, and surveillance companies can earn millions of dollars selling ways to exploit them, our defenses are limited, especially if a government decides it wants our data,” warns Hubbard. Nine iOS updates later, they are still unpatched. While earlier this month, security researcher Denis Tokarev accused Apple of negligence for ignoring multiple ‘zero day’ vulnerabilities (exploits publicly known to hackers) which he submitted to Apple back in April. In the case of Pegasus, research has subsequently shown its attacks date as far back as 2016. ![]() But the issue of awareness bends both ways. ![]() To Apple’s credit, when it learned of the exploit a fix was issued within days. ![]() IOS 15 - Apple is coming under increasing scrunity for its security practices Apple ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |