January 5, 2022
Multiple vulnerabilities have been discovered in Apple Products, the most severe of these could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.
Join our community!!
Subscribe to the Insecurity Brief podcast now on every platform we can find
#apple #vpn #microsoft #spyware #mac #iphone #spyware #exploit #iOS #iPadOS #WatchOS #tvOS #Xcode #Safari #iTunes
Pegasus is spyware developed by a private contractor for use by government agencies. The program infects a target’s phone and sends back data, including photos, messages, and audio / video recordings. Pegasus’ developer, an Israeli company called NSO Group,
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution in the context of the affected user.
An all-out effort to develop a consumer-focused security labeling program will likely initially focus on Internet of Things (IoT) devices and could include many technology products used by small businesses as well.
Deferred Prosecution Agreement disclosure by the US Government named ExpressVPN CIO Daniel Gericke as one of the members of Project Raven, a mercenary intelligence unit that helped the United Arab Emirates spy on its enemies. Gericke received a monetary penalty of $335,000 and had agreed to cooperate with the FBI.
Honey Beez is a retired computer hacker, chess addict, author, and mother. Honey is an American and a New Yorker. She has written several Children’s books and chess books as well as creating an American chess opening called The Bee Defense.
Trip Elix is an author, podcaster and video personality Over the last 30 years, he has worked as a security analyst and privately as a consultant, investigator, forensic technician and a skip tracer. He is the author of three books and gives talks on security and privacy.