娛樂

【】

字号+作者:囫圇吞棗網来源:知識2024-11-21 21:26:21我要评论(0)

Most smartphone hacks these days, even the most dangerous ones, require some sort of user interactio

Most smartphone hacks these days, even the most dangerous ones, require some sort of user interaction — tapping on a link, opening a message, installing an app — for the hacker to gain control of the device.

But a particularly nasty iPhone exploit (via Ars Technica) allowed for an attacker to instantly take over someone's iPhone from a distance, without the need for any user interaction. It's really as scary as it sounds: Just look at the video of it in action, below.

The exploit was found by security researcher Ian Beer, who works at Google's Project Zero team. It involves a vulnerability in AWDL, Apple's protocol that allows iPhones, Macs, and other devices to create peer-to-peer mesh networks, which enable features such as AirDrop and AirPlay.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

Finding the exploit was not easy — Beer has a lengthy technical explanation of how he did it, if you're up for it — but the bottom line was that it allows an attacker to remotely reboot iPhones, and completely take them over after they've been rebooted, with access to photos, messages, and other user data. The attacker does need to be within Wi-Fi range for the attack to work.

Check out a demonstration of an attack that uses this exploit in action in the video, below.

Now, the good news: Apple has already patched the exploit in May 2020, meaning that iPhones with the latest security updates are all secure. Also, Beer himself notes he has no evidence that the bug was exploited in the wild.

SEE ALSO:Of course this is the most downloaded iPhone app of 2020

Still, it's amazing that one person managed to crack the iPhone's security in such a complete manner. It begs the question: If one guy can do this on his own, what can a team of paid professionals with a lot of time and resources do?

TopicsAppleCybersecurityiPhone

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

相关文章
  • Photos show the Blue Cut fire blazing a path of destruction in California

    Photos show the Blue Cut fire blazing a path of destruction in California

    2024-11-21 21:22

  • 詹姆斯43+14 威少三雙 麥克勒莫28分 湖人送開拓者4連敗(威少3和詹姆斯17)

    詹姆斯43+14 威少三雙 麥克勒莫28分 湖人送開拓者4連敗(威少3和詹姆斯17)

    2024-11-21 20:10

  • 38+三雙,詹姆斯劍指得分王!威少找回狀態,濃眉也傳來好消息(威少57分三雙)

    38+三雙,詹姆斯劍指得分王!威少找回狀態,濃眉也傳來好消息(威少57分三雙)

    2024-11-21 18:56

  • 錯怪他了�!C羅揭秘去沙特真因,不是為了2億,是為了亞洲足球進步(C羅什麽時候加盟尤文)

    錯怪他了!C羅揭秘去沙特真因,不是為了2億 ,是為了亞洲足球進步(C羅什麽時候加盟尤文)

    2024-11-21 18:45

网友点评