Apple yesterday released iOS patches to three zero-day vulnerabilities that were discovered by Google’s Project Zero security team.
Researchers said all three vulnerabilities were used as part of an exploit chain that lets attackers compromise iOS devices and potentially turn users' devices against them, taking over the camera or microphone, sharing location data and logging keystrokes as users enter personal or work credentials.
Shane Huntley, director of the threat analysis group at Google Security, wrote in a tweet that the targeted zero-days in the wild patched by Apple late this week were similar to the other zero-days Google reported on its Chrome platform earlier this week. Huntley also added that the zero-days did not appear to be related to any election-related hacking activity.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.