![]() The disclosure comes as Apple rolled out iOS 16.4, iPadOS 16.4, macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5, tvOS 16.4, and watchOS 9.4 with numerous bug fixes. The update is available in versions iOS 15.7.4 and iPadOS 15.7.4 for iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation). Apple’s iOS 16.1, which fixed major previous bugs prone to hackers, was introduced Monday. "Processing maliciously crafted web content may lead to arbitrary code execution," Apple said in a new advisory, adding it's "aware of a report that this issue may have been actively exploited."ĭetails surrounding the exact nature of exploitation are currently not known, but withholding technical specifics is standard procedure as it helps prevent additional in-the-wild abuse targeting susceptible devices. Apple has issued a security alert to all iPhone users: update your handset as soon as possible. Join our insightful webinar! Save My Seat! In the same year, a Saudi dissident sued the company for its alleged role in hacking a device belonging to journalist Jamal Khashoggi, who was murdered inside the Saudi embassy in Turkey.Zero Trust + Deception: Learn How to Outsmart Attackers!ĭiscover how Deception can detect advanced threats, stop lateral movement, and enhance your Zero Trust strategy. ![]() NSO has been implicated in other hacks, including the high-profile hack of Amazon founder Jeff Bezos in 2018. In addition to Pegasus, NSO offers other tools that locate where a phone is being used, defend againstĪnd mine law enforcement data to spot patterns. Other companies provide similar software.ĬEO Shalev Hulio co-founded the company in 2010. The company, which licenses surveillance software to government agencies, says its Pegasus software helps authorities combat criminals and terrorists who take advantage of encryption technology to go " dark." Pegasus runs secretly on smartphones, providing insight into what their owners are doing. NSO released a statement that didn't directly address Apple's update but said it "will continue to provide intelligence and law enforcement agencies around the world with life saving technologies to fight terror and crime." The spyware is reportedly capable of accessing and recording texts, videos, photos and web activity as well as passively recording and scraping passwords on a device. ![]() Some of the people appear to have been targets of secret surveillance through Pegasus, software that's supposed to be used to pursue criminals and terrorists. All but three of the devices were iPhones. In a security advisory posted on its site, the. Of activists, journalists and businesspeople. Apple has once again released security updates to address zero-day vulnerabilities that are being used in attacks against iPhone, iPads and Macs. ![]() In July, researchers found evidence of attempted or successful installations of Pegasus on 37 According to Citizen Lab, the zero-day, zero-click exploit against iMessage, which it nicknamed ForcedEntry, targets Apple's image rendering library and was effective against the company's iPhones, The security fix, earlier reported by The New York Times, stems from research done by a public interest cybersecurity group called Citizen Lab that found a Saudi activist's phone had been infected with Pegasus, NSO's best-known product. The company used the event to say that iOS 15 and iPadOS 15 would generally be available for free download starting Sept. The patches came a day before Apple's splashy fall event that introduced new versions of iPhones and iPads, along with the latest Apple Watch. "Apple is aware of a report that this issue may have been actively exploited."Īpple also released WatchOS 7.6.2, MacOS Big Sur 11.6 and a security update for "Processing a maliciously crafted PDF may lead to arbitrary code execution," the note read. A security note for iOS 14.8 and iPadOS 14.8 said some harmful PDFs could take advantage of Apple's popular operating systems. ![]()
0 Comments
Leave a Reply. |