[ad_1]
Without the owners of the device making specific mistakes
Researchers found a vulnerability in iPhones that allowed hackers to enter them remotely, without device owners making specific mistakes.
Smartphones are commonly hacked due to user error, opening a dangerous link or message or downloading a malicious application; This allows hackers to take control of the phone; According to the “BBC”.
Researcher Ian Bear, who works for Google Project Zero, revealed how hackers could steal emails, photos, messages, and even access the camera and microphone thanks to a hardware vulnerability.
Apple corrected the problem and fixed the bug last May.
IPhones could be hacked over Wi-Fi networks, using a technology called Apple Wireless Direct Link.
The technology made it possible to use a Wi-Fi network to send files and photos through Apple AirDrop technology, and easily share the screen with other devices running the iOS system.
Researcher Bear conducted a hands-on experiment to exploit this and show how hackers can penetrate a device from a distance.
And he explained through a blog how he had managed to hack the phone, after six months of research on this issue.
IPhones hack smartphones
A vulnerability in iPhones that allows hackers to penetrate them remotely
Sabaq electronic journal
Previously
2020-12-03
Researchers found a vulnerability in iPhones that allowed hackers to enter them remotely, without device owners making specific mistakes.
Smartphones are usually hacked due to user error, which opens a dangerous link or message or downloads a malicious application; This allows hackers to take control of the phone; According to the “BBC”.
Researcher Ian Bear, who works for Google Project Zero, revealed how hackers could steal emails, photos, messages, and even access the camera and microphone thanks to a hardware vulnerability.
Apple took care of the problem and fixed the bug last May.
IPhones could be hacked over Wi-Fi networks, using a technology called Apple Wireless Direct Link.
The technology made it possible to use the Wi-Fi network to send files and photos through Apple AirDrop technology, and easily share the screen with other devices running the iOS system.
Researcher Bear conducted a hands-on experiment to exploit this and show how hackers can penetrate a device from a distance.
And he explained through a blog how he had managed to hack the phone, after six months of research on this issue.
03 December 2020 – 18 Rabi al-Thani 1442
09:29
Without the owners of the device making specific mistakes
Researchers found a vulnerability in iPhones that allowed hackers to enter them remotely, without device owners making specific mistakes.
Smartphones are usually hacked due to user error, which opens a dangerous link or message or downloads a malicious application; This allows hackers to take control of the phone; According to the “BBC”.
Researcher Ian Bear, who works for Google Project Zero, revealed how hackers could steal emails, photos, messages, and even access the camera and microphone thanks to a hardware vulnerability.
Apple took care of the problem and fixed the bug last May.
IPhones could be hacked over Wi-Fi networks, using a technology called Apple Wireless Direct Link.
The technology made it possible to use a Wi-Fi network to send files and photos through Apple AirDrop technology, and easily share the screen with other devices running the iOS system.
Researcher Bear conducted a hands-on experiment to exploit this and show how hackers can penetrate a device from a distance.
And he explained through a blog how he had managed to hack the phone, after six months of research on this issue.
window.fbAsyncInit = function() { FB.init({ appId : 636292179804270, autoLogAppEvents : true, xfbml : true, version : 'v2.10' }); FB.AppEvents.logPageView(); };
(function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "https://connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));
[ad_2]
Source link