Post Profile






Microsoft talks about learnings from Trident/Pegasus iOS vulnerabilities

Back in August, findings about a sophisticated, targeted, and persistent mobile attack on iOS using three zero-day vulnerabilities called “Trident” was published. Pegasus is a mobile espionage product which was used to make use of Trident vulnerabilities. The attack allows an adversary to silently jailbreak an iOS device and stealthily spy on victims, collecting information […]
read more

share

Related Posts


Microsoft ships emergency patch for IE6, IE7, and IE8 to fix vulnerability used in targeted attacks

Technology : The Next Web Blog

Late on Sunday, Microsoft announced it would be releasing an emergency patch for Internet Explorer to patch a security hole used to breach Windows computers in targeted attacks. On Monday,... Keep reading ?

Apple issues critical update to thwart ‘Pegasus’ malware

Technology : The Next Web Blog

Security researchers have identified a three-headed monster that could be used to record sounds, collect passwords, read text messages, record calls and track users. All iOS versions 9.3.4 and below are vulnerable. The attack utiliz...

Attackers Use Microsoft Security Hole Against Energy, Defense, Finance Targets

Technology : Bits

After Microsoft issued a security advisory Saturday, attackers were already using a vulnerability to attack targets in the defense and energy sectors. The activity prompted Microsoft to release a patch on Thursday to fix the problem...

Security researcher claims three new PayPal vulnerabilities could let an attacker hijack anyone’s account

Technology : Venture Beat

Security researcher Yasser Ali has publicly disclosed what appear to be three new vulnerabilities in PayPal. When used together, Ali claims they can be used to hijack anyone’s account in a targeted attack. The “targeted attack” part...

Emergency iOS update patches ‘Trident’ vulnerabilities used to hack the New York Times

Technology : The Next Web Blog

Security researchers have identified a three-headed monster that could be used to record sounds, collect passwords, read text messages, record calls and track users. All iOS versions 9.3.4 and below are vulnerable. The attack utiliz...

Comments


Copyright © 2016 Regator, LLC