Friday, August 26, 2016

It detected the most perfect “master key” for iPhone – BBC News

Apple has released a firmware update for the iPhone, eliminating three extremely serious vulnerability. They were not known to the skilled company and probably used the secret services of many countries to intercept messages from a large number of programs, including Gmail, Facebook, WhatsApp, Skype b Mail.Ru Group production applications.

For the attacks used software who discovered it, researchers from the manufacturer of software for cyber Lookout named Pegasus. As it turned out, this powerful “set of the hacker” has developed a company owned by US citizens. Buy it could all willing to pay $ 8 million for 300 licenses.

In order to infect the victim’s iPhone via the Pegasus, the user had to convince enough to go on a special link. After that, the device is automatically installed jailbreak, who shot sewn into iOS protection against third-party software, and then -. Necessary to monitor communications victims of software components

About Pegasus and use them to vulnerabilities representatives Lookout and the University of Toronto, said in a blog. They argue that had never faced so difficult arranged software for cyber-espionage. The developers of this working remotely “master key” for the iPhone even made it modular, so that the customer can customize it to fit your needs, and have implemented strong encryption to evade detection.




Read also: How to protect yourself from surveillance on smartphones


Three vulnerability job Pegasus, Apple patched in the latest, vysheshem eve update for iOS – 9.3.5. Although the Pegasus, probably used only against the most important goals, such as businessmen from large companies, politicians and opposition activists, its installation is strongly recommended for all owners of compatible iOS 9 iPhone and iPad.

& # x41E; & # x431;  & # x437; & # x43E; & # x440;  Samsung Galaxy Note7: & # x445; & #  x430; & # x440; & # x430; & # x43A;  & # x442; & # x435; & # x440;  & # x438; & # x441; & # x442;  & # x438; & # x43A; & # x438 ;,  & # x43E; & # x442; & # x437;  & # x44B; & # x432; & # x44B ;,  & # x446; & # x435; & # x43D;  & # x430;

Source: Ars Technica

LikeTweet

No comments:

Post a Comment