ออฟไลน์ด้วยแอป Player FM !
Cybersecurity expert: Israeli spyware company NSO Group poses ‘a serious threat to phone users’
ซีรีส์ที่ถูกเก็บถาวร ("ฟีดที่ไม่ได้ใช้งาน" status)
When? This feed was archived on November 30, 2021 04:09 (). Last successful fetch was on October 28, 2021 05:55 ()
Why? ฟีดที่ไม่ได้ใช้งาน status. เซิร์ฟเวอร์ของเราไม่สามารถดึงฟีดพอดคาสท์ที่ใช้งานได้สักระยะหนึ่ง
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 302401937 series 1612267
A massive security flaw was discovered in Apple's iPhone this week — and it's a biggie. The phones could be broken into without the user doing anything to trigger the hack. Without even a click, your information could be at risk.
That news left iPhone users scrambling to update their devices. It was security researchers at the The Citizen Lab at University of Toronto who realized that spyware from an Israeli cybersurveillance company known as NSO Group was behind it.
Related: Security flaw exposed in Germany, followed by criminal investigation
Apple quickly released a critical software patch to fix a security vulnerability that researchers said could allow hackers to directly infect iPhones and other Apple devices without any user action.
Citizen Lab researchers said the security issue was exploited to plant spyware on a Saudi activist's iPhone.
The previously unknown vulnerability affected all major Apple devices — iPhones, Macs and Apple Watches, the researchers said. NSO Group responded with a one-sentence statement saying it will continue providing tools for fighting “terror and crime.”
Related: Biden and Putin both place a 'high priority' on cybersecurity
It was the first time a so-called “zero-click” exploit — one that doesn't require users to click on suspect links or open infected files — has been caught and analyzed, the researchers said. They found the malicious code on Sept. 7, and immediately alerted Apple. The targeted activist asked to remain anonymous, they said.
John Scott-Railton, a senior researcher with The Citizen Lab in Canada who discovered the breach with his colleagues, joined The World's host Carol Hills to talk about the international spyware marketplace that fosters these kinds of exploits.
Related: US agencies hacked in monthslong global cyberspying campaign
This interview has been edited and condensed for clarity. AP contributed to this report.
135 ตอน
ซีรีส์ที่ถูกเก็บถาวร ("ฟีดที่ไม่ได้ใช้งาน" status)
When? This feed was archived on November 30, 2021 04:09 (). Last successful fetch was on October 28, 2021 05:55 ()
Why? ฟีดที่ไม่ได้ใช้งาน status. เซิร์ฟเวอร์ของเราไม่สามารถดึงฟีดพอดคาสท์ที่ใช้งานได้สักระยะหนึ่ง
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 302401937 series 1612267
A massive security flaw was discovered in Apple's iPhone this week — and it's a biggie. The phones could be broken into without the user doing anything to trigger the hack. Without even a click, your information could be at risk.
That news left iPhone users scrambling to update their devices. It was security researchers at the The Citizen Lab at University of Toronto who realized that spyware from an Israeli cybersurveillance company known as NSO Group was behind it.
Related: Security flaw exposed in Germany, followed by criminal investigation
Apple quickly released a critical software patch to fix a security vulnerability that researchers said could allow hackers to directly infect iPhones and other Apple devices without any user action.
Citizen Lab researchers said the security issue was exploited to plant spyware on a Saudi activist's iPhone.
The previously unknown vulnerability affected all major Apple devices — iPhones, Macs and Apple Watches, the researchers said. NSO Group responded with a one-sentence statement saying it will continue providing tools for fighting “terror and crime.”
Related: Biden and Putin both place a 'high priority' on cybersecurity
It was the first time a so-called “zero-click” exploit — one that doesn't require users to click on suspect links or open infected files — has been caught and analyzed, the researchers said. They found the malicious code on Sept. 7, and immediately alerted Apple. The targeted activist asked to remain anonymous, they said.
John Scott-Railton, a senior researcher with The Citizen Lab in Canada who discovered the breach with his colleagues, joined The World's host Carol Hills to talk about the international spyware marketplace that fosters these kinds of exploits.
Related: US agencies hacked in monthslong global cyberspying campaign
This interview has been edited and condensed for clarity. AP contributed to this report.
135 ตอน
ทุกตอน
×ขอต้อนรับสู่ Player FM!
Player FM กำลังหาเว็บ