Apple iMessage Flaw Lets Remote Attackers Read Files on iPhones

Discussion in 'mobile device security' started by guest, Jul 29, 2019.

  1. guest

    guest Guest

    Apple iMessage Flaw Lets Remote Attackers Read Files on iPhones
    July 29, 2019
    https://www.bleepingcomputer.com/ne...-lets-remote-attackers-read-files-on-iphones/
     
  2. guest

    guest Guest

    Google researchers disclose exploits for 'interactionless' iOS attacks
    July 30, 2019
    https://www.zdnet.com/article/google-researchers-disclose-exploits-for-interactionless-ios-attacks/
     
  3. guest

    guest Guest

    Update to iOS 12.4 right away
    July 30, 2019
    https://www.kaspersky.com/blog/ios-critical-vulnerabilities-124/27778/
     
  4. guest

    guest Guest

    90% of Enterprise iPhone Users Open to iMessage Spy Attack
    Vast majority of Apple iOS users haven’t updated to iOS 12.4, leaving themselves wide open to a public exploit
    August 2, 2019
    https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/
     
  5. guest

    guest Guest

    Apple iMessage flaw stokes concerns over iPhone sandbox security
    August 5, 2019
    https://www.scmagazineuk.com/apple-...cerns-iphone-sandbox-security/article/1592998
     
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    The Many Possibilities of CVE-2019-8646
    https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html
     
  7. guest

    guest Guest

    Google researcher beefs up iMessage security by demonstrating clickless exploit
    January 9, 2020
    https://www.cyberscoop.com/google-imessage-clickless-ios-exploit-project-zero/
    Google Project Zero
    Blog post series about the interactionless iPhone exploit over iMessage:
     
    Last edited by a moderator: Jan 9, 2020
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.