Analysis: NSO Group’s Pegasus spyware could allegedly track locations and access passwords

For almost a year, spyware sold by Israel’s NSO Group was allegedly armed with a computer security super-weapon: a zero-footprint, zero-click, zero-day exploit that used a vulnerability in iMessage to seize control of an iPhone at the push of a button.

That means it would have left no visible trace of being placed on target’s phones, could be installed by simply sending a message that the victim didn’t even need to click on, and worked even on phones that were running the then-latest version of iOS, the operating system for iPhones.

Continue reading…

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

The changing face of modern warfare: How ‘cheap’ drones are moving the Ukraine war from the trenches to city skyscrapers – and could be pivotal in Kyiv’s fight to defeat Putin

Ukraine has warned Vladimir Putin that more drone attacks coming — just…

On Swampy ground: a brief history of protest tunnelling in the UK

As HS2 protesters dig down in London, veteran activists explain why the…

Nasa’s Artemis I Moon rocket faces ‘fuelling issues’ on launchpad

NASA is preparing to launch its Artemis I mission to the Moon…