in

Apple iPhone can be compromised with “zero clicks”, security experts come to help

On July 20th, an international organization Amnesty International released a research report on NSO Group’s Pegasus software. It pointed out that the iPhone has security vulnerabilities, allowing Pegasus to use “zero-click” attacks to successfully invade iPhones equipped with iOS 14.6. 12 on.

Zero-click, that is, the user does not need to click any third-party URL to interact, and the attacker can easily invade the user’s mobile phone and obtain the corresponding information.

It is reported that Pegasus is a commercial spyware, which is a product released by the Israeli NSO Group, which can invade any Apple and Android devices.

In response, Apple responded that Pegasus’ attacks are very complex, with development costs as high as millions of dollars, and the available cycle is very short, generally only targeting specific people.

360 mobile phone security expert Ge Jian told us that only from the exploitation of this vulnerability, it is indeed aimed at a specific group of people, and the chance of being exposed as an ordinary person is very small.

But it also gave us a warning: Apple’s system is not 100% secure. Although it is more difficult to use than Android in some aspects, such as programs and systems, we should not take it lightly in our daily use because of the difference in the system;

Privacy leakage and theft are not limited to malicious programs. Phishing URLs and impersonation (customer service, government officials, etc.) have endless methods for obtaining information, and they are not restricted by the system.

While Apple condemned the behavior, it did not further explain the vulnerabilities of the iOS system. In the iOS 14.7 update that Apple pushed to iPhone users on July 20, there was no mention of the fix for this vulnerability.

360 mobile phone security expert Ge Jian emphasized that this malware uses special vulnerabilities to carry out malicious actions. If it is not touched by itself, there will be no problems with the phone.

Therefore, in daily use, you don’t have to worry too much about the privacy and security of your mobile phone. Viruses in general mobile phones will have performance loss (slow card), traffic hijacking, induced payment, and data hijacking.

The surface of the Internet is calm, but it can always set off a security storm in the deep sea. As an ordinary netizen, how can you protect your own network security?

Related mobile phone security experts told us:

  • Maintain good personal Internet habits, do not easily disclose or provide your own private information, such as ID number, photo, bank card number, etc.;

  • Access information sent by strangers, such as links to unfamiliar text messages, applications in chats, and many Trojan horses or phishing websites are spread through these channels;

  • Install third-party security protection software, which can effectively alert and remove phishing URLs, fraudulent text messages, and Trojan horse programs;

In the digital age, smart phones have become an important information carrier for users, and mobile network security issues cannot be ignored. On the premise that terminal equipment sellers provide security guarantees, consumers should also take the initiative to strengthen their own network security awareness and guard against privacy leaks and telecommunications fraud.

Share this: