security

Apple Tells iPhone Users to Update Due to Security Flaw – Here's How – Tech.co


Pegasus exploits “zero-click” vulnerabilities, meaning that Apple users don’t even need to install software to prompt the attack. The malware can be delivered through images attached to PassKit, sent from a fake iMessage account, making it very hard for users to tell when they’re being surveilled.

“This latest find shows once again that civil society is targeted by highly sophisticated exploits and mercenary spyware.” – Citizen Lab

Citizen Lab first discovered the security gap when they were checking the device of a Washington DC-based civil society employee. After discovering Pegasus’ mercenary spyware on the device, they immediately disclosed their findings to Apple.

The NSO Group first developed Pegasus back in 2011, and the Israeli spyware has since claimed a number of high-profile victims including the president of France Emmanual Macron, and the president of the European Council Charles Michel.

Pegasus tends to be deployed against political opponents and dissidents, making it unlikely for regular users to be targeted. However, if you’re not keen on taking chances, here’s how to protect yourself from the spyware.



READ SOURCE

Readers Also Like:  Hundreds of banking apps at risk from the new Nexus Android trojan - Fox News

This website uses cookies. By continuing to use this site, you accept our use of cookies.