Get the latest tech news
Operation Triangulation: What You Get When Attack iPhones of Researchers
Imagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to capture all the stages of the a...
Security Playlists:'37c3' videos starting here/ audio Imagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to capture all the stages of the attack. This led to the fixing of four zero-day vulnerabilities and discovering of a previously unknown and highly sophisticated spyware that had been around for years without anyone noticing. * How we managed to discover and capture all stages of a zero-click attack on iOS, despite the attackers’ efforts to hide and protect it, * a comprehensive analysis of the entire attack chain, which exploited five vulnerabilities, including four zero-days * the capabilities of the malware that transforms your phone into the ultimate surveillance tool, * and the links to previously known malware we were able to find.
Or read this on r/apple