Wednesday, November 20, 2019

With an iMessage hackers can penetrate your iPhone, learn details

Featured

Hong Kong: Students movement threatens the next escalation

Possibly it was due to the mediators that worse could be prevented in Hong Kong. The deputies, lawyers and...

Trump said: Sondland is great American now President’s famous ‘U-turn’

President Donald Trump has a history of distancing himself from associates who have found themselves in legal trouble or...

Babri mosque: Indian Supreme Court ruled in favor of Hindus in a dispute over a religious position with Muslims

India's Supreme Court on Saturday ruled in favor of a Hindu group in a long-running legal battle over a...
Avatar
Izaan Zubair
Izaan's expertise in technology urged him to write on emerging inventions, Hardware, Cyber-Security, Mobiles and so on. He is currently studying Machine learning, and aims to master it. He can be reached at: [email protected]

In Apple’s iMessage messaging service, a new error has been detected, which allows hackers to access the user’s iPhone, but according to the report, this is a “less interactive” hack because the user doesn’t need to do anything, such as downloading any files or clicking on any suspicious link will put your device at risk, and even worse, it doesn’t need to open the iMessage app.

Citing the Phonearena, at the Black Hat security conference in Las Vegas this week, Natalie Silvanovic, a Google Project Zero researcher, displayed a number of these alleged bugs within iMessage that can be used to remotely access your iPhone.

The researcher pointed out that potential attackers can send a targeted iMessage containing specific content that can be interpreted by Apple’s servers in a certain way and send a message that will lead to a hack automatically, and give the attacker access to the phone, and according to researchers, it is likely that the vulnerabilities they revealed in iMessage is a result of the complex and ever-growing nature of the application.

Read also: Apple to reward $ 1 million under vulnerability detection program

Avatar
Izaan Zubair
Izaan's expertise in technology urged him to write on emerging inventions, Hardware, Cyber-Security, Mobiles and so on. He is currently studying Machine learning, and aims to master it. He can be reached at: [email protected]

Latest News

Hong Kong: Students movement threatens the next escalation

Possibly it was due to the mediators that worse could be prevented in Hong Kong. The deputies, lawyers and...

US marine demands $ 20 million compensation for his imprisonment in Iran for espionage

A former US Marine is demanding $20 million from the Terrorism Victims Fund. Amir Mirza Hekmati, who holds US and Iranian citizenship, was jailed...

US welcomes the release of two American and Australian hostages from Afghanistan

US Secretary of State Mike Pompeo said his country welcomes the release of hostages including US professor Kevin King and Australian professor Timothy Weeks,...

Mark Esper: We are committed to support Philippines to deter terrorist threats

Washington is committed to supporting the Philippines to deter terrorist threats in the region, US Defense Secretary Mark Esper said at a joint press...

British election campaign overshadowed by a sex scandal cloud on Prince Andrew

Britain's election campaign was overshadowed by a cloud of Prince Andrew alleged sex scandal on Monday as Queen Elizabeth's second son faced a backlash...
- Advertisement -

Related News