Are Passkeys the Future? Apple Seems to Think So...
It's no secret that passwords are a pain in the butt. They can be difficult to remember, they're a huge target for cybercriminals, etc.
Telephone
1 (877) 664-9379
Press "1" for Support
Press "2" for Sales
Press "3" for Finance
Headquarters
861 Lafayette Rd
Unit 4
Hampton, NH 03842
In the blog post (https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html) written by Ian Beer, he says hackers had been discretely attacking iPhones who visited compromised websites.
Victims were targeted and attacked indiscriminately. The blog post doesn't name which websites were compromised by hackers but Beer says they were regularly visited by people. Beer claims the sites in question were visited thousands of times a week.
According to Beer, Project Zero found five different exploit chains that leveraged 12 individual security flaws. 7 of those flaws were found to be a part of Apple's built-in iPhone web browser, Safari.
Each of the attack chains allows the attacker to gain "root" access to the device. Root access is the highest level of access on an iPhone. Root access would allow a hacker to install malicious programs that would allow them to spy on an iPhone user without the user ever knowing they were being spied on.
Google claims attackers were using this exploit to steal photos, messages, stored passwords and even use the phone's built-in GPS to physically locate a hacked individual while they use their phone.
Apple was notified by Project Zero back in February of this year. Apple patched the security flaws six days later with the release of iOS 12.1.4.
Beer says while the patch seemed to be effective, it doesn't mean that similar attacks aren't currently underway. Apple recently launched a $1 million bounty program. The "award," if you can call it that, will go to anyone who could find flaws that allow an attacker to gain root access.
If there's more news to come will keep you posted. Otherwise, I think I'm in the market for a new phone. The one in the photo below looks promising...
Like our blog? Subscribe using the CTA in the upper right hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.
It's no secret that passwords are a pain in the butt. They can be difficult to remember, they're a huge target for cybercriminals, etc.
A newly discovered exploit is using a flaw in Microsoft's Support Diagnostic Tool (MSDT) to remotely take over end-points via compromised Word...
It used to take a good deal of coding knowledge to build a website or an application. That's not the case anymore. You can build a website in...