Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 4 / 7
138 résultats taggé Apple  ✕
Analysis of a new macOS Trojan-Proxy https://securelist.com/trojan-proxy-for-macos/111325/
06/12/2023 14:13:42
QRCode
archive.org
thumbnail

A new macOS Trojan-Proxy is riding on cracked versions of legitimate software; it relies on DNS-over-HTTPS to obtain a C&C (command and control) address.
Illegally distributed software historically has served as a way to sneak malware onto victims’ devices. Oftentimes, users are not willing to pay for software tools they need, so they go searching the Web for a “free lunch”. They are an excellent target for cybercriminals who realize that an individual looking for a cracked app will be willing to download an installer from a questionable website and disable security on their machine, and so they will be fairly easy to trick into installing malware as well.

securelist EN 2023 MacOS Trojan Malware Trojan-Proxy Descriptions Technologies Piracy Apple
Apple Confirms Governments Using Push Notifications to Surveil Users - MacRumors https://www.macrumors.com/2023/12/06/apple-governments-surveil-push-notifications/
06/12/2023 14:12:30
QRCode
archive.org
thumbnail

Unidentified governments are surveilling smartphone users by tracking push notifications that move through Google's and Apple's servers, a US...
In a letter to the Department of Justice, Senator Ron Wyden said foreign officials were demanding the data from the tech giants to track smartphones. The traffic flowing from apps that send push notifications put the companies "in a unique position to facilitate government surveillance of how users are using particular apps," Wyden said. He asked the Department of Justice to "repeal or modify any policies" that hindered public discussions of push notification spying.

macrumors EN 2023 privacy iOS iPhone iPad Apple push surveillance
Governments spying on Apple, Google users through push notifications https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/
06/12/2023 14:11:40
QRCode
archive.org

Unidentified governments are surveilling smartphone users via their apps' push notifications, a U.S. senator warned on Wednesday.

reuters EN 2023 Apple iphone push notification surveillance iPhone US
Russian Hackers’ Lawsuit Reveals Weaknesses In Apple’s iOS 16 https://www.forbes.com/sites/thomasbrewster/2023/12/04/russian-hacker-lawsuit-exposes-flaws-in-apples-ios-16
05/12/2023 19:14:12
QRCode
archive.org
thumbnail

A Moscow legal battle strongly indicates that phone forensics tools used by both the FBI and FSB are exploiting security loopholes in Apple’s operating system.

forbes EN 2023 russia ukraine america forensics iphone apple ios ios-16 ios-17 oxygen
iPhone: Why Apple is working hard to break into its own phones https://www.independent.co.uk/tech/iphone-apple-security-software-lockdown-mode-b2450192.html
24/11/2023 16:02:11
QRCode
archive.org
thumbnail

In a secret location in Paris, Apple has hired an elite team of laser-wielding hackers to try and crack its iPhones. Andrew Griffin gets an inside look

independent.co.uk EN 2023 Apple iPhone Internal
Apple neglects to patch multiple critical vulnerabilities in macOS https://www.intego.com/mac-security-blog/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos/
11/11/2023 10:46:44
QRCode
archive.org
thumbnail

Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including curl and LibreSSL.

intego EN 2023 Apple patch high-severity macOS Sonoma curl open-source
Apple 'Find My' network can be abused to steal keylogged passwords https://www.bleepingcomputer.com/news/apple/apple-find-my-network-can-be-abused-to-steal-keylogged-passwords/
04/11/2023 15:34:01
QRCode
archive.org
thumbnail

Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards.

The Find My network and application is designed to help users locate lost or misplaced Apple devices, including iPhones, iPads, Macs, Apple Watches, AirPods, and Apple Tags.

The service relies on GPS and Bluetooth data crowd-sourced from millions of Apple devices worldwide to find devices reported as lost or stolen, even if those are offline.

bleepingcomputer EN 2023 Apple Apple-Find-My Bluetooth Data-Exfiltration Find-My Keylogger Network
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security https://positive.security/blog/send-my
04/11/2023 15:32:24
QRCode
archive.org
thumbnail

Apple AirTags: Arbitrary data can be uploaded from non-internet-connected devices by sending Find My BLE broadcasts to nearby Apple devices. We're releasing an ESP32 firmware that turns the microcontroller into an (upload only) modem, and a macOS application to retrieve, decode and display the uploaded data.

positive.security EN 2023 Apple AirTags Arbitrary data
Triangulation: validators, post-compromise activity and modules | Securelist https://securelist.com/triangulation-validators-modules/110847/
26/10/2023 17:49:57
QRCode
archive.org
thumbnail

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
#2023 #APT #Apple #EN #Malware #Malware-Description #Triangulation #analysis #iOS #macOS #securelist #spyware

EN macOS spyware Apple Malware-Description 2023 analysis APT iOS Triangulation securelist Malware
0-days exploited by commercial surveillance vendor in Egypt https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/
23/09/2023 23:19:50
QRCode
archive.org
thumbnail

Last week Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0-day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is used to install its Predator spyware surreptitiously onto a device.

In response, yesterday, Apple patched the bugs in iOS 16.7 and iOS 17.0.1 as CVE-2023-41991, CVE-2023-41992, CVE-2023-41993. This quick patching from Apple helps to better protect users and we encourage all iOS users to install them as soon as possible.

Google EN 2023 TAG Apple Android CitizenLab Predator spyware Intellexa CVE-2023-41993 CVE-2023-41991 CVE-2023-41992 Exploit Chain 0-days
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware https://thehackernews.com/2023/09/latest-apple-zero-days-used-to-hack.html
23/09/2023 10:30:59
QRCode
archive.org
thumbnail

The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023.

"The targeting took place after Eltantawy publicly stated his plans to run for President in the 2024 Egyptian elections," the Citizen Lab said, attributing the attack with high confidence to the Egyptian government owing to it being a known customer of the commercial spying tool.

thehackernews EN 2023 0-day 0-days Predator Egypt Apple CitizenLab CVE-2023-41991 CVE-2023-41992 CVE-2023-41993
Apple emergency updates fix 3 new zero-days exploited in attacks https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-3-new-zero-days-exploited-in-attacks/
22/09/2023 00:05:09
QRCode
archive.org
thumbnail

Apple released emergency security updates to patch three new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 16 zero-days patched this year.

bleepingcomputer Apple iPhone Mac EN 2023 0-day CVE-2023-41993 CVE-2023-41991
Last Week on My Mac: How quickly can Apple release a security update? https://eclecticlight.co/2023/09/10/last-week-on-my-mac-how-quickly-can-apple-release-a-security-update/#like-74253
10/09/2023 11:18:45
QRCode
archive.org
thumbnail

We seldom get much insight into how long Apple takes to release an urgent update to macOS, but last week must have seen one of the quickest in recent times. By my reckoning, Apple’s engineers accomplished that in 6-10 days, across four of its operating systems, and with two distinct vulnerabilities.

eclecticlight EN 2023 Apple security update macos release
Apple discloses 2 new zero-days exploited to attack iPhones, Macs https://www.bleepingcomputer.com/news/apple/apple-discloses-2-new-zero-days-exploited-to-attack-iphones-macs/
07/09/2023 20:54:32
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited zero-days patched since the start of the year.

bleepingcomputer EN 2023 Apple Apple-Watch Code-Execution iOS iPhone Mac watchOS Zero-Day
China Bans iPhone Use for Government Officials at Work https://www.wsj.com/world/china/china-bans-iphone-use-for-government-officials-at-work-635fe2f8
06/09/2023 14:19:20
QRCode
archive.org
thumbnail

The directive is the latest step in Beijing’s campaign to cut reliance on foreign technology and could hurt Apple’s business in the country.

wsj EN 2023 China iPhone ban Apple Officials
Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy https://www.wired.com/story/apple-csam-scanning-heat-initiative-letter/?s=09
03/09/2023 14:12:31
QRCode
archive.org
thumbnail

Child safety group Heat Initiative plans to launch a campaign pressing Apple on child sexual abuse material scanning and user reporting. The company issued a rare, detailed response on Thursday.

wired EN 2023 apple CSAM Decision Controversy privacy
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode https://thehackernews.com/2023/08/new-apple-ios-16-exploit-enables.html
19/08/2023 17:22:46
QRCode
archive.org
thumbnail

Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could be abused to fly under the radar and maintain access to an Apple device even when the victim believes it is offline.

The method "tricks the victim into thinking their device's Airplane Mode works when in reality the attacker (following successful device exploit) has planted an artificial Airplane Mode which edits the UI to display Airplane Mode icon and cuts internet connection to all apps except the attacker application," Jamf Threat Labs researchers Hu Ke and Nir Avraham said in a report shared with The Hacker News.

thehackernews EN 2023 iOS apple airplanemode exploit
This $70 device can spoof an Apple device and trick you into sharing your password https://techcrunch.com/2023/08/16/this-70-device-can-spoof-an-apple-device-and-trick-you-into-sharing-your-password/?guccounter=1&guce_referrer=aHR0cHM6Ly90LmNvLw&guce_referrer_sig=AQAAAKih2YQkaFDJihALtWMhORM2sEdkKOLlqiWEVzT6VyzsZ-1YWhyCt6wC0_kGLKNPtn5BPITBEeG_O2VC0IA-t4I5oEtbWk7WK-nVZq08UoqSUkrMux5uUNi_Hwj2en8YYZmH8ntyORsi4NNLTEO1Qp_P3MdkTydhce3aTflkVuCT
16/08/2023 19:00:40
QRCode
archive.org
thumbnail

Attendees at Def Con, one of the world’s largest hacking conferences, are used to weird shenanigans, such as a seemingly innocuous wall of computer screens that display people’s passwords sniffed over the conference Wi-Fi network. But at this year’s event, even conference veterans were confused and concerned when their iPhones started showing pop-up messages prompting them to connect their Apple ID or share a password with a nearby Apple TV.

techcrunch EN 2023 defcon Apple iPhone pop-up messages AppleTV
An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass https://www.wired.com/story/apple-mac-background-task-management-flaw/
14/08/2023 07:20:04
QRCode
archive.org
thumbnail

The macOS Background Task Manager tool is supposed to spot potentially malicious software on your machine. But a researcher says it has troubling flaws.

wired EN 2023 Apple macOS Task-Manager PatrickWardle bypass
Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release https://www.sentinelone.com/blog/apple-crimeware-massive-rust-infostealer-campaign-aiming-for-macos-sonoma-ahead-of-public-release/
31/07/2023 14:57:55
QRCode
archive.org
thumbnail

Crimeware actors have launched an extensive campaign to target macOS users with malware disguised in multiple fake blockchain games.

sentinelone EN 2023 Apple Crimeware Rust Infostealer Campaign macOS Sonoma
page 4 / 7
4521 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio