Inverse Times
[Inverse Times has been officially decommissioned but will remain online as a resource and to preserve backlinks; active site here.]
Independent Publishing
 
"Religion: it is better to DIE in delusion than LIVE in REALITY" -- Anon

» Gallery


Search

search comments
advanced search



this site  web    
Avoid Google's intrusive, snoopware technologies!


We are ONE
We are ONE


http://inversetimes.lingama.net/news/newsfeed.php

"Asymmetry
is a
Keyboard"


Google, your data suppression methods are obvious, easily recorded, abysmally inept and generally pathetic.

The simple fact that you actively engage in suppressing this and other alternative news sites means we have won and TRUTH will prevail in the end.
printable version
PDF version

Hackers have been putting 'monitoring implants' in iPhones for years, Google says
by Katy Clifton via sarah - Evening Standard Friday, Aug 30 2019, 10:46pm
international / prose / post

Hackers have been using compromised websites to install "monitoring implants" in iPhones for years, according to researchers at Google.

applehack.jpg

The malicious software gathers users' images, contacts and other information.

Ian Beer, from Google's Project Zero, said in a blog post that the hacked sites had received thousands of visitors each week.

Mr Beer said: "There was no target discrimination; simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, to install a monitoring implant."

Project Zero is the technology company's team for examining new security vulnerabilities.

Mr Beer said most of the security flaws were found within Safari, the default web browser on Apple devices.

Operating systems from iOS 10 to iOS 12 were targeted in the hack, which was able to access users' apps including Instagram, WhatsApp and Gmail.

Google said it reported the security issues to Apple on February 1. Apple then released an operating system update six days later.

Mr Beer warned that while the implant is not saved on Apple devices, it can again provide access to hackers when the owner visits a "compromised site".

"Given the breadth of information stolen, the attackers may nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device," he said.

Apple did not immediately respond to a request for comment.

Copyright applies.

iphones.jpg


 
<< back to stories
 

© 2018-2024 Inverse Times Open Publishing.
Unless otherwise stated by the author, all content is free for non-commercial re-use, reprint, and rebroadcast, on the net and elsewhere.
Opinions are those of the contributors and are not necessarily endorsed by Inverse Times Open Publishing.
Disclaimer | Privacy [ text size >> ]