![]() ![]() However, what we do know is that the exploit involved PassKit attachments sent via iMessage, which can lead to sensitive information like identity and financial data being compromised, as the PassKit framework is what’s used to operate Apple Pay and the Wallet app.Īt the time of writing, one of the known attacks was said to include an employee of a Washingon DC-based civil society organization, whose phone was compromised by NGO Group’s Pegasus spyware - which allows the exploiter to access various data points, including photos, messages audio, video and more. At the time of writing Apple has maintained its usual public response, which is, “For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available.” ![]() The exploit was first discovered by Citizen Lab, a spyware research group, who immediately notified Apple. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |