Connect with us

Hi, what are you looking for?


The dangerous vulnerability allows you to take control of the iPhone. Apple has already released the appropriate patch

The dangerous vulnerability allows you to take control of the iPhone.  Apple has already released the appropriate patch

Watch the video
Apple only copies from others? Nonsense. These three devices changed the world of technology [TOPtech]

apple It is famous for the fact that it pays great attention to the security of its devices. protection IphoneIt is considered extremely difficult to crack, but even Apple has had mishaps in this area. Now the company has recognized one of them.

Apple revealed a vulnerability that allows it to control the iPhone

Apple has published two reports describing the discovery of a serious vulnerability in its hardware software, allowing you to bypass security. The vulnerability could allow you to control a large number of Apple products. It mainly concerns iPhones (iPhone 6S and all files latest models), certain iPads (including the iPad Pro and Air 2), and Macs with macOS Monterey.

Apple has admitted that an anonymous cybersecurity researcher first noticed the vulnerability. in Report addedThat “this issue may have been actively exploited”. The company has of course already released relevant updates containing patches to fix the issue. Experts recommend updating affected hardware systems to the latest versions as soon as possible.

as noted AP . AgencyVulnerabilities similar to those just disclosed are being exploited by commercial companies such as NSO Group. is the Israeli company responsible for creating Pegasus, that is, software that has been loudly released in recent months on Vistula (the presence of Pegasus has been revealed on the phones of, among other things, Attorney General Ewa Wrzosek, attorney Roman Gertich and the politics of the Krzysztof Brygsa Civic Tribune).

See also  Xbox Game Pass in September with a very strong offer. Microsoft revealed 10 more games

Pegasus can, among other things, monitor all operations performed on the phone, record video and audio and send them to the software operator in real time or steal Messages and eavesdropping on conversations. The program was officially used to fight terrorism and organized crime, but it is known unofficially that it has been used in some countries to eavesdrop on opposition politicians, journalists or activists who are unfavorable to the authorities.

You can find more about new technologies at

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like


Another person familiar with Sony’s plans confirms the killer news for PS5 owners. Horizon Forbidden West is not expected to appear on the market...


The British government has canceled a recommendation to avoid travel to and from the eight regions most affected by the Indian coronavirus variant altogether....


It looks like Tesla wants to use lasers instead of standard wipers in the future. I applied for a patent for this solution. The...


Farmer reveals government plans for CPK The farmer who issued the documents is a member of the social council of the CPK. As he...