![]() This vulnerability is applicable on Android, iOS, Windows 10 Mobile, and Tizen devices. It even let them activate devices' cameras and microphones to take recordings. This allowed hackers to collect data on phone calls, messages, photos, and videos. This attack installed an older and well-known piece of spyware called Pegasus. When the hacker can run code in a location that should be secure, they can take malicious steps. This is where an attack deliberately puts in so much code into a small buffer that it "overflows" and writes code into a location it shouldn't be able to access. This worked through a method known as buffer overflow. ![]() And the target may not even be aware that malware has been installed on their device. Even if the target didn't answer the call, the attack could still be effective. This scary attack allowed hackers to access a device simply by placing a WhatsApp voice call to their target. ![]() Another WhatsApp vulnerability discovered in early 2019 was the Pegasus voice call hack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |