[ad_1]
Web sites do not need a user input to infiltrate into a device because you only have to visit them to install the iPhone. A transplant goes to the victim's device to steal sensitive data such as images and iMessages, as well as to update the attackers on the GPS location in real time.
Release of 3 new models of iPhone .. September 10
A number of research institutions have noted that sites can also infiltrate users' key chains and all passwords, as well as other end-to-end encrypted email databases such as Telegram and WhatsApp.
The Project Zero team discovered that 14 vulnerabilities were affecting iPhone devices running iOS 10 until the latest version of iOS 12.
Exploiting Project Zero took advantage of a security breach unknown to Apple. As a result, users have no way to protect themselves from attacks. Malware used by websites disappears as soon as the iPhone is restarted. Google has notified Google Cupertino of problems occurred in February and the giant The technology already corrects a solution with the update iOS 12 released in a month.
This article "Google" reveals websites that can steal data from the iPhone "Adapted from the site (Vito Portal), and does not reflect in any way the site's policy or point of view, but the responsibility of the News or its accuracy relies on the original source of news is Vito Portal.
[ad_2]
Source link