White hat hackers from Google use remote exploit to hack iPhone
iPhone was considered as one of the most cyber-secure devices until Google stepped in.
Hackers from Google at Project Zero have identified exploitable flaws which lead to compromising of targeted iPhone. The exploited flaw is placed under a clickless flaw as it doesn't require the victim to click on a malicious link in order to fall for the attack. All that the hacker requires is iPhone's Apple ID to remotely compromise the phone.
The time taken to steal data such as passwords, emails, and messages from the phone is merely a few minutes. The vulnerability can also be used by the attackers to access other functions like microphones and cameras. All of this sensitive information and features are easily accessible for the hacker without taking any permission or without even notifying the user.
The vulnerability exploited was classified as CVE-2019-8641, which is a remote memory-corruption flaw. The security flaw has already been fixed by Apple in its latest update and all the users with installed updates are currently at no harm. Although the Apple users must understand and keep their Apple IDs to themselves. In case the ID has been compromised, the best measure is to take immediate data backup and create a secure and fresh ID by keeping it to yourself.
Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (124)
- Events and News (26)
- Features (44)
- Security (424)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (5)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)