{"id":5517,"date":"2023-11-07T06:39:28","date_gmt":"2023-11-07T06:39:28","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=5517"},"modified":"2023-11-07T06:39:28","modified_gmt":"2023-11-07T06:39:28","slug":"this-cheap-hacking-device-can-crash-your-iphone-with-pop-ups","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=5517","title":{"rendered":"This Cheap Hacking Device Can Crash Your iPhone With Pop-Ups"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Because the <a href=\"https:\/\/www.wired.com\/tag\/israel-hamas-war\/\">Israel-Hamas war<\/a> continues, with Israeli troops shifting into the Gaza Strip and encircling Gaza Metropolis, one piece of expertise is having an outsized influence on how we see and perceive the struggle. Messaging app Telegram, which has a historical past of lax moderation, has been <a href=\"https:\/\/www.wired.com\/story\/telegram-hamas-israel-conflict\/\">used by Hamas to share gruesome images and videos<\/a>. The data has then unfold to different social networks and thousands and thousands extra eyeballs. Sources inform WIRED that Telegram has been <a href=\"https:\/\/www.wired.com\/story\/telegram-hamas-israel-conflict\/\">weaponized to spread horrific propaganda<\/a>.<\/p>\n<p class=\"paywall\">Microsoft has had a tough few months with regards to the corporate\u2019s personal safety, with Chinese language-backed hackers <a href=\"https:\/\/www.wired.com\/story\/china-backed-hackers-steal-microsofts-signing-key-post-mortem\/\">stealing its cryptographic signing key<\/a>, continued points with <a href=\"https:\/\/www.wired.com\/story\/microsoft-exchange-server-vulnerabilities\/\">Microsoft Exchange Servers<\/a>, and its prospects being impacted by failings. The corporate has now unveiled a plan to cope with the ever-growing vary of threats. It\u2019s the <a href=\"https:\/\/www.wired.com\/story\/microsoft-secure-future-initiative\/\">Secure Future Initiative<\/a>, which plans, amongst a number of components, to make use of AI-driven instruments, enhance its software program growth, and shorten its response time to vulnerabilities.<\/p>\n<p class=\"paywall\">Additionally this week, we\u2019ve seemed on the privateness practices of Bluesky, Mastodon, and Meta\u2019s Threads as all the social media platforms jostle for house in a world the place X, previously generally known as Twitter, continues to implode. And <a href=\"https:\/\/www.wired.com\/story\/x-alternatives-user-privacy-report\/\">things aren\u2019t exactly great<\/a> with this subsequent era of social media. With November arriving, we now have an in depth breakdown of the safety vulnerabilities and patches issued final month. Microsoft, Google, Apple, and enterprise corporations Cisco, VMWare, and Citrix all <a href=\"https:\/\/www.wired.com\/story\/apple-google-microsoft-critical-update-october-2023\/\">fixed major security flaws in October<\/a>.<\/p>\n<p class=\"paywall\">And there is extra. Every week, we spherical up the safety and privateness information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the complete tales, and keep secure on the market.<\/p>\n<p class=\"paywall\">The <a href=\"https:\/\/www.wired.com\/story\/what-is-flipper-zero-tiktok\/\">Flipper Zero<\/a> is a flexible hacking device designed for safety researchers. The pocket-size pen-testing gadget can intercept and replay all types of wi-fi alerts\u2014together with NFC, infrared, RFID, Bluetooth, and Wi-Fi. Meaning it is doable to learn microchips and examine alerts being admitted from gadgets. Barely extra nefariously, <a href=\"https:\/\/www.wired.com\/story\/what-is-flipper-zero-tiktok\/\">we&#8217;ve found it can easily clone building-entry cards<\/a> and skim bank card particulars via individuals&#8217;s garments.<\/p>\n<p class=\"paywall\">Over the previous few weeks, the Flipper Zero, which prices round $170, has been <a href=\"https:\/\/arstechnica.com\/security\/2023\/11\/flipper-zero-gadget-that-doses-iphones-takes-once-esoteric-attacks-mainstream\/\">gaining some traction for its ability to disrupt iPhones<\/a>, significantly by sending them into denial of service (DoS) loops. As <a href=\"https:\/\/arstechnica.com\/security\/2023\/11\/flipper-zero-gadget-that-doses-iphones-takes-once-esoteric-attacks-mainstream\/\">Ars Technica reported<\/a> this week, the Flipper Zero, with some customized firmware, is ready to ship \u201ca continuing stream of messages\u201d asking iPhones to attach by way of Bluetooth gadgets corresponding to an Apple TV or AirPods. The barrage of notifications, which is distributed by a close-by Flipper Zero, can overwhelm an iPhone and make it nearly unusable.<\/p>\n<p class=\"paywall\">\u201cMy cellphone was getting these pop-ups each couple of minutes, after which my cellphone would reboot,\u201d safety researcher Jeroen van der Ham informed Ars a couple of DoS assault he skilled whereas commuting within the Netherlands. He later replicated the assault in a lab setting, whereas <a href=\"https:\/\/techcrunch.com\/2023\/09\/05\/flipper-zero-hacking-iphone-flood-popups\/\">other security researchers have also demonstrated<\/a> the spamming means in latest weeks. In van der Ham\u2019s assessments, the assault solely labored on gadgets working iOS 17\u2014and in the meanwhile, the one method to forestall the assault is by turning off Bluetooth.<\/p>\n<p class=\"paywall\">In 2019, hackers linked to Russia\u2019s intelligence service broke into the community of software program agency SolarWinds, <a href=\"https:\/\/www.wired.com\/story\/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever\/\">planting a backdoor and ultimately finding their way into thousands of systems<\/a>. This week, the US Securities and Trade Fee charged Tim Brown, the CISO of SolarWinds, and the corporate <a href=\"https:\/\/techcrunch.com\/2023\/10\/31\/sec-solarwinds-ciso-investors-cyberattack\/\">with fraud and \u201cinternal control failures<\/a>.\u201d The SEC alleges that Brown and the corporate overstated SolarWinds\u2019 cybersecurity practices whereas \u201cunderstating or failing to reveal identified dangers.\u201d The SEC claims that SolarWinds knew of \u201cparticular deficiencies\u201d within the firm\u2019s safety practices and made public claims that weren\u2019t mirrored in its personal inside assessments.<\/p>\n<p class=\"paywall\">\u201cFairly than tackle these vulnerabilities, SolarWinds and Brown engaged in a marketing campaign to color a false image of the corporate\u2019s cyber controls setting, thereby depriving buyers of correct materials data,\u201d Gurbir S. Grewal, director of the SEC\u2019s Division of Enforcement <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-227\">said in a statement<\/a>. In response, Sudhakar Ramakrishna, the CEO of SolarWinds, <a data-offer-url=\"https:\/\/orangematter.solarwinds.com\/2023\/10\/30\/transparency-information-sharing-and-collaboration\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/orangematter.solarwinds.com\/2023\/10\/30\/transparency-information-sharing-and-collaboration\/&quot;}\" href=\"https:\/\/orangematter.solarwinds.com\/2023\/10\/30\/transparency-information-sharing-and-collaboration\/\" rel=\"nofollow noopener\" target=\"_blank\">said in a blog post<\/a> that the allegations are a part of a \u201cmisguided and improper enforcement motion.\u201d<\/p>\n<p class=\"paywall\">For years, researchers have proven that face recognition programs, skilled on thousands and thousands of images of individuals, can misidentify girls and folks of colour at disproportionate charges. The programs have <a href=\"https:\/\/www.wired.com\/story\/wrongful-arrests-ai-derailed-3-mens-lives\/\">led to wrongful arrests<\/a>. A <a href=\"https:\/\/www.politico.com\/news\/2023\/10\/31\/new-orleans-police-facial-recognition-00121427\">new investigation from Politico<\/a>, specializing in a 12 months\u2019s price of face recognition requests made by police in New Orleans, has discovered that the expertise was nearly completely used to attempt to establish Black individuals. The system additionally \u201cdidn&#8217;t establish suspects a majority of the time,\u201d the report says. Evaluation of 15 requests for using face recognition expertise discovered that solely considered one of them was for a white suspect, and in 9 circumstances the expertise didn&#8217;t discover a match. Three of the six matches have been additionally incorrect. \u201cThe information has just about confirmed that [anti-face-recognition] advocates have been largely appropriate,\u201d one metropolis councilor stated.<\/p>\n<p class=\"paywall\">Id administration firm Okta has revealed extra particulars about an intrusion into its programs, which it <a href=\"https:\/\/www.wired.com\/story\/okta-support-system-breach-disclosure\/\">first disclosed on October 20<\/a>. The corporate stated the attackers, who had accessed its buyer help system, <a data-offer-url=\"https:\/\/www.bleepingcomputer.com\/news\/security\/okta-breach-134-customers-exposed-in-october-support-system-hack\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bleepingcomputer.com\/news\/security\/okta-breach-134-customers-exposed-in-october-support-system-hack\/&quot;}\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/okta-breach-134-customers-exposed-in-october-support-system-hack\/\" rel=\"nofollow noopener\" target=\"_blank\">accessed files belonging to 134 customers<\/a>. (In these situations, prospects are particular person corporations that subscribe to Okta\u2019s companies). \u201cA few of these recordsdata have been HAR recordsdata that contained session tokens which may in flip be used for session hijacking assaults,\u201d the corporate <a data-offer-url=\"https:\/\/sec.okta.com\/harfiles\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/sec.okta.com\/harfiles&quot;}\" href=\"https:\/\/sec.okta.com\/harfiles\" rel=\"nofollow noopener\" target=\"_blank\">disclosed<\/a> in a weblog put up. These session tokens have been used to \u201chijack\u201d the Okta classes of 5 separate corporations. 1Password, BeyondTrust, and Cloudflare have all beforehand disclosed they detected suspicious exercise, however it isn&#8217;t clear who the 2 remaining corporations are.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/flipper-zero-iphone-dos-attack-security-roundup\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because the Israel-Hamas war continues, with Israeli troops shifting into the Gaza Strip and encircling Gaza Metropolis, one piece of expertise is having an outsized influence on how we see and perceive the struggle. Messaging app Telegram, which has a historical past of lax moderation, has been used by Hamas to share gruesome images and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[2972,1372,1058,5771,5772,5773],"class_list":["post-5517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-cheap","tag-crash","tag-device","tag-hacking","tag-iphone","tag-popups"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/5517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5517"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/5517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/5519"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}